Ethical Hacking - GAINING ACCESS(1)
Gaining Access Introduction
Everything is a computer
Two main approaches
(1)Server Side
Do not require user interaction, all we need is a target IP!
Start with information gathering, find open ports, OS, installed services, and work from there.
(2)Client Side
Require user interaction, such as opening a file, a link.
Informaiton gathering is key here, create a trojan and use social engineering to get the target to run it.
>>>>What if the target uses the same nerwork as us...
相信未来 - 该面对的绝不逃避,该执著的永不怨悔,该舍弃的不再留念,该珍惜的好好把握。

浙公网安备 33010602011771号