Any good hacker will take a few common steps to attack a site these can generally be ordered from 1-4.
- Reconnaissance
- Scanning
- Research Vulnerabilities
- Performing the attack
This Information Security blog is about my views and experiences in the information security, computer forensics and incident response industry as a student, professional and educator.
No comments:
Post a Comment