Attacking Enterprise Networks
Stages
Pre-Engagement
Information Gathering
Vulnerability Assessment
Exploitation
Post-Exploitation
Lateral Movement
Proof of Concept
Post-Engagement
Last updated
Stages
Pre-Engagement
Information Gathering
Vulnerability Assessment
Exploitation
Post-Exploitation
Lateral Movement
Proof of Concept
Post-Engagement
Last updated