Menu
![]() The goal here is to discover what a hacker or other malicious user can uncover about the organization, its technical infrastructure, locations, employees, policies, security stance, and financial situation. Although these steps don't constitute breaking in, they occur at the point which a hacker will start to get interactive. ![]() This lesson introduces you to the two of the most important pre-attach phases: foot printing and scanning.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |