If an attacker is performing a directed attack against a specific organization, he generally starts in stealth mode to avoid the attacks being detected by the organization. This can be done by passively enumerating information leaked onto public systems about the organization, its personnel, and its systems. The attacker is likely to then move into using active enumeration techniques where he attempts to pull information from the organization's systems to determine what vulnerabilities may be available.

Was this article helpful?

0 0
The Ultimate Computer Repair Guide

The Ultimate Computer Repair Guide

Read how to maintain and repair any desktop and laptop computer. This Ebook has articles with photos and videos that show detailed step by step pc repair and maintenance procedures. There are many links to online videos that explain how you can build, maintain, speed up, clean, and repair your computer yourself. Put the money that you were going to pay the PC Tech in your own pocket.

Get My Free Ebook

Post a comment