Part 1. The Attacker's Kill Chain
Starting with Kali Linux
Identifying the Target – Passive Reconnaissance
Active Reconnaissance and Vulnerability Scanning
Exploit
Post Exploit – Action on the Objective
Post Exploit – Persistence
Starting with Kali Linux
Identifying the Target – Passive Reconnaissance
Active Reconnaissance and Vulnerability Scanning
Exploit
Post Exploit – Action on the Objective
Post Exploit – Persistence