Skip to main content

Module 0: Introduction

Notes

  • For every vulnerability, there is a patch, and then there is another vulnerability, and thus another patch....and it keeps going
  • Computer Systems are not secure and are complex
  • One vulnerability can bring the whole system down
  • Hacking the Hackers
    • Step 1: Recon
      • Looking at all attack vectors
    • Step 2: Gaining a foothold
      • Exploiting a zero-day for a dedicated device
    • Step 3: Internal recon
      • Passive network listening
      • Careful, slow network scanning
    • Step 4: Gaining influence in the network
      • Being able to modify and access data on the network
    • Step 5: Total compromise