Section 2: A Plethora of Attack Vectors
In this section, you will learn about a plethora of attack vectors, including network-based, software-based, mobile devices, wireless networks, and IoT devices.
This part of the book comprises the following chapters:
- Chapter 9, Malware and Other Digital Attacks
- Chapter 10, Sniffing and Evading IDS, Firewalls, and Honeypots
- Chapter 11, Hacking Wireless Networks
- Chapter 12, Hacking Mobile Platforms