Further reading
The following are resources that can be used to gain more knowledge about what was covered in this chapter:
- Discover & Attack Network Devices with Sparta: https://www.youtube.com/watch?v=owEVhvbZMkk
- Data exfiltration: https://www.forcepoint.com/cyber-edu/data-exfiltration
- Hacker tools for ethical hackers: https://youtu.be/X07Gc717U8E
- 15 million customer records stolen: https://www.bleepingcomputer.com/news/security/suntrust-bank-says-former-employee-stole-details-on-15-million-customers/
- Security awareness on Cyber Kill Chain: https://www.sans.org/blog/applying-security-awareness-to-the-cyber-kill-chain/
- MITRE Kill Chain: https://www.erdalozkaya.com/comodo-mitre-kill-chain/
- Cyber Kill Chain: https://www.exabeam.com/information-security/cyber-kill-chain/