Exploiting a machine is a Systematic Process:
- Find the open ports and services running on ports
- Enumerate the services and the machine
- Exploit the correct vulnerability and gain access
- Do proper post exploitation enumeration
- Privilege Escalation
Referenced from http://niiconsulting.com/checkmate/2017/06/a-detail-guide-on-oscp-preparation-from-newbie-to-oscp/
沒有留言:
張貼留言