Theme Switcher

Navigation Topics

Gaining Access Phase

To gain access, an attacker needs to make a connection to the victim's system. 

Exploit - software, commands that exploit a vulnerability in a system in order to cause unintended behavior.

Attacks - deliberate attempt by attacker to access, steal, destroy or manipulate information or to disrupt legitimate users access.

Methods used to gain Access

  • 1. Vulnerabilities exploitation
  • 2. Privilege escalation
  • 3. Password cracking
  • 4. Wireless attacks
  • 5. Spoofing
  • 6. Spamming

Comming Soon!!!