Here's where the fun stuff begins. Pwnage! For those not in the know. Pwn is hacker speak for own. If you have been pwned, your systems have been owned. In other words, I own your system now I am in full control of it. Exploitation is the process of owning or compromising the machine. So far, we have gathered information on our target by gathering public information on the target and scanned the target network for vulnerabilities. We are now ready for the attack.
Black Hats will pick the busiest times to hit your network and do it slowly and quietly as possible. They will try to stay under the noise of normal operations. Yes, there are more eyes on the network at that time, but as a smart cracker knows, if you are slow and quiet, a lot of traffic is a good cover.
If you're the security operations guy and you're testing your own network, this is not a good...