Attacco Informatico

Get Started. It's Free
or sign up with your email address
Attacco Informatico by Mind Map: Attacco Informatico

1. Information Gathering

1.1. Non-Tech Hacking

1.1.1. Trashing

1.1.2. Shoulder Surfing

1.1.3. Social Engineering

1.1.4. Tailgating

1.2. Tech Hacking

1.2.1. Auto Scanner

1.2.2. OS Fingerprint

1.2.3. Port Scanning (Nmap)

1.2.4. CMS Scanner

2. Attack

2.1. Exploit

2.1.1. Metasploit

2.1.2. Exploit 0Day

2.2. Misconfig

2.2.1. Directory Listing

2.3. Malware

2.3.1. RAT

2.3.2. Keylogger

2.4. Other

2.4.1. Password Cracking

2.4.2. DDOS

2.4.3. WiFi Sniffing

2.4.4. Man in the middle

2.4.5. Phishing

3. Backdoor Install

4. Erase Traces