Attacking Enterprise Networks

Stages

  • Pre-Engagement

  • Information Gathering

  • Vulnerability Assessment

  • Exploitation

  • Post-Exploitation

  • Lateral Movement

  • Proof of Concept

  • Post-Engagement

Last updated