Module 0: Introduction
Notes
- For every vulnerability, there is a patch, and then there is another vulnerability, and thus another patch....and it keeps going
- Computer Systems are not secure and are complex
- One vulnerability can bring the whole system down
- Hacking the Hackers
- Step 1: Recon
- Looking at all attack vectors
- Step 2: Gaining a foothold
- Exploiting a zero-day for a dedicated device
- Step 3: Internal recon
- Passive network listening
- Careful, slow network scanning
- Step 4: Gaining influence in the network
- Being able to modify and access data on the network
- Step 5: Total compromise