1/5
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Weaponization
Powershell: attacker creates malware
Delivery
Spearphishing attack: malware delivered to the victims PC
Exploitation
Exploit public-facing application: attacker will exploit the malware used or a vulnerability in the system
Installation
Dynamic linker hijacking: attacker installs backdoors to bypass security
Command & Control
Fallback channels: link is used to connect the attacker to victims PC
Exfiltration
Data from local system: attacker taking from the victims PC