First page Back Continue Last page Summary Graphics
Where do I want to go?
- Scan the target network
- Map the target network (identify systems and devices)
- Identify vulnerable services and systems resources
- Choose a system with an exploitable vulnerability
- Exploit the vulnerability