Attacco Informatico

Laten we beginnen. Het is Gratis
of registreren met je e-mailadres
Attacco Informatico Door Mind Map: Attacco Informatico

1. Information Gathering

1.1. Non-Tech Hacking

1.1.1. Trashing

1.1.2. Shoulder Surfing

1.1.3. Social Engineering

1.1.4. Tailgating

1.2. Tech Hacking

1.2.1. Auto Scanner

1.2.2. OS Fingerprint

1.2.3. Port Scanning (Nmap)

1.2.4. CMS Scanner

2. Attack

2.1. Exploit

2.1.1. Metasploit

2.1.2. Exploit 0Day

2.2. Misconfig

2.2.1. Directory Listing

2.3. Malware

2.3.1. RAT

2.3.2. Keylogger

2.4. Other

2.4.1. Password Cracking

2.4.2. DDOS

2.4.3. WiFi Sniffing

2.4.4. Man in the middle

2.4.5. Phishing

3. Backdoor Install

4. Erase Traces