Gaining access. Offensive blue team operations

Gaining Access
Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

Gaining Access:- After scanning, the hacker designs the blueprint of the network of the target with the help of data collected during Phase 1 and Phase 2. This is the phase where the real hacking takes place. Vulnerabilities discovered during the reconnaissance and scanning phase are now exploited to gain access.

The method of connection the hacker uses for an exploit can be a local area network (LAN, either wired or wireless), local access to a PC, the Internet, or offline. Examples include stack based buffer overflows, denial of service (DoS), and session hijacking. These topics will be discussed in later chapters. Gaining access is known in the hacker world as owning the system.

A huge range of tools are available to offensivly test and gain access to networks and systems these can be found at Kali.org

Designed as tools to access a host of computers, servers and networks these tools are the basis of main stream hacking.  Have a look at some of the tools and see how they operate to help with your assessment on your network. 

BLOG COMMENTS POWERED BY DISQUS

Have you seen Our Expedition to Tokyo called 6000 Down.  You can find it on Facebook.  To start the Donation process for the Expedition click donate below

Cookies make it easier for us to provide you with our services. With the usage of our services you permit us to use cookies.
Ok