Section 3 - I’m a Pirate, Hear Me Roar
We will be performing a cradle-to-grave walkthrough of scanning systems, gathering information, exploiting vulnerabilities, gaining access, escalating privileges, and then pivoting through our lab infrastructure. These tactics, techniques, and procedures need to be practiced and sharpened in order to maintain an edge in this industry. Technologies and strategies are constantly evolving, which by default causes the threat landscape to change and ultimately forces us to level up our skills.
The following chapters will be covered under this section:
- Chapter 7, Scanning 101
- Chapter 8, Protocols 202
- Chapter 9, Ninja 308
- Chapter 10, I Can Do It 420
- Chapter 11, Whoot... I Have To Go Deep