From the course: Foundational JavaScript Security
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Plan an attack strategy - JavaScript Tutorial
From the course: Foundational JavaScript Security
Plan an attack strategy
- [Instructor] As a proper followup to the cyber kill chain, an ethical hacker always needs a plan, which he typically presents to his client. The plan of attack consists in properly determining what are going to be the steps to evaluate the resources are vulnerable or not. When a white hat hacker is hired to evaluate specific resources, the plan needs to be customized to fit this approach. So let's say we were hired to evaluate an application's vulnerabilities. Let's take a look at what this plan will look like. Reconnaissance, which is step one, evaluate vulnerabilities of the application's code database access to users. Then step two is to create the script tool for exploiting the resources. Step three, send the exploit or upload to the application database. And step four, install the tool or code in the application. And typically, at this point, a tool would probably make some minor changes into the code without…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.