Attacco Informatico

Kom i gang. Det er Gratis
eller tilmeld med din email adresse
Attacco Informatico af Mind Map: Attacco Informatico

1. Information Gathering

1.1. Non-Tech Hacking

1.1.1. Trashing

1.1.2. Shoulder Surfing

1.1.3. Social Engineering

1.1.4. Tailgating

1.2. Tech Hacking

1.2.1. Auto Scanner

1.2.2. OS Fingerprint

1.2.3. Port Scanning (Nmap)

1.2.4. CMS Scanner

2. Attack

2.1. Exploit

2.1.1. Metasploit

2.1.2. Exploit 0Day

2.2. Misconfig

2.2.1. Directory Listing

2.3. Malware

2.3.1. RAT

2.3.2. Keylogger

2.4. Other

2.4.1. Password Cracking

2.4.2. DDOS

2.4.3. WiFi Sniffing

2.4.4. Man in the middle

2.4.5. Phishing

3. Backdoor Install

4. Erase Traces