Ethical Hacking - GAINING ACCESS(1)

Gaining Access Introduction

Everything is a computer

Two main approaches

(1)Server Side

Do not require user interaction, all we need is a target IP!

Start with information gathering, find open ports, OS, installed services, and work from there.

(2)Client Side

Require user interaction, such as opening a file, a link.

Informaiton gathering is key here, create a trojan and use social engineering to get the target to run it.

 

>>>>What if the target uses the same nerwork as us...

 

posted @ 2019-12-19 20:50  晨风_Eric  阅读(132)  评论(0编辑  收藏  举报