Ayo Secu

  • 홈
  • 태그
  • 방명록

Collection 1

Collection

CollectionIn the collection phase, attackers gather data of interest from within the compromised environment. This phase is focused on harvesting valuable information such as databases, credentials, sensitive files, and communications. Common methods of collection include database dumps, capturing audio, video, or screen activity, and accessing internal documentation, network shared drives, and ..

Security Terms/Attack Structure 2025.01.16
이전
1
다음
더보기
  • 분류 전체보기 (144)
    • Security Terms (144)
      • Threat Modeling (5)
      • Attack Structure (14)
      • Exploits (5)
      • Detection (11)
      • Incident Management (6)
      • Digital Forensics (7)
      • Network Security (35)
      • Web Application (22)
      • Cryptography, Authenticatio.. (8)
      • Infrastructure Virtualizati.. (9)
      • OS Implementation and Syste.. (8)
      • Mitigations (10)
      • Malware Reversing (4)

Tag

web application, threat modeling, attack structure, incident management, NETWORK SECURITY, cybersecurity, Digital Forensics, Detection, Authentication, network, security terms, Exploit, Cryptography, systems, security, identity, infrastructure virtualization, forensic, os implementation, mitigations,

Copyright © Kakao Corp. All rights reserved.

티스토리툴바