Attack Phase: Target Acquisition Flashcards
1
Q
Techniques used in order to acquire a target:
A
- Activating probing assaults
- Running vulnerability scans
- Trusted systems and trusted process assessments
2
Q
General notes:
A
- The act of acquiring a target doesn’t have to do with designating a system to breach
- Target acquisition is the act of finding a device behind the perimeter that you may be able to use to come closer to your target information, establish that device as a target to compromise, discover the vulnerabilities of that device, and then exploit those vulnerabilities to gain as much access as you can and extract as much data from it as you can.
- Researching that which is behind the firewall/perimeter