Attacco Informatico
by Luca Mercatanti
1. Information Gathering
1.1. Non-Tech Hacking
1.1.1. Trashing
1.1.2. Shoulder Surfing
1.1.3. Social Engineering
1.1.4. Tailgating
1.2. Tech Hacking
1.2.1. Auto Scanner
1.2.2. OS Fingerprint
1.2.3. Port Scanning (Nmap)
1.2.4. CMS Scanner
2. Attack
2.1. Exploit
2.1.1. Metasploit
2.1.2. Exploit 0Day
2.2. Misconfig
2.2.1. Directory Listing
2.3. Malware
2.3.1. RAT
2.3.2. Keylogger
2.4. Other
2.4.1. Password Cracking
2.4.2. DDOS
2.4.3. WiFi Sniffing
2.4.4. Man in the middle
2.4.5. Phishing