From the course: Foundational JavaScript Security

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Plan an attack strategy

Plan an attack strategy

- [Instructor] As a proper followup to the cyber kill chain, an ethical hacker always needs a plan, which he typically presents to his client. The plan of attack consists in properly determining what are going to be the steps to evaluate the resources are vulnerable or not. When a white hat hacker is hired to evaluate specific resources, the plan needs to be customized to fit this approach. So let's say we were hired to evaluate an application's vulnerabilities. Let's take a look at what this plan will look like. Reconnaissance, which is step one, evaluate vulnerabilities of the application's code database access to users. Then step two is to create the script tool for exploiting the resources. Step three, send the exploit or upload to the application database. And step four, install the tool or code in the application. And typically, at this point, a tool would probably make some minor changes into the code without…

Contents