2018年4月28日 星期六

Systematic Machine Exploiting Process

Exploiting a machine is a Systematic Process:
  1. Find the open ports and services running on ports
  2. Enumerate the services and the machine
  3. Exploit the correct vulnerability and gain access
  4. Do proper post exploitation enumeration
  5. Privilege Escalation
Referenced from http://niiconsulting.com/checkmate/2017/06/a-detail-guide-on-oscp-preparation-from-newbie-to-oscp/

沒有留言:

張貼留言