Ayo Secu

  • 홈
  • 태그
  • 방명록

Collection 1

Collection

CollectionIn the collection phase, attackers gather data of interest from within the compromised environment. This phase is focused on harvesting valuable information such as databases, credentials, sensitive files, and communications. Common methods of collection include database dumps, capturing audio, video, or screen activity, and accessing internal documentation, network shared drives, and ..

Security Terms/Attack Structure 2025.01.16
이전
1
다음
더보기
  • 분류 전체보기 (144)
    • Security Terms (144)
      • Threat Modeling (5)
      • Attack Structure (14)
      • Exploits (5)
      • Detection (11)
      • Incident Management (6)
      • Digital Forensics (7)
      • Network Security (35)
      • Web Application (22)
      • Cryptography, Authenticatio.. (8)
      • Infrastructure Virtualizati.. (9)
      • OS Implementation and Syste.. (8)
      • Mitigations (10)
      • Malware Reversing (4)

Tag

security, security terms, Exploit, Authentication, identity, forensic, web application, infrastructure virtualization, network, incident management, Cryptography, threat modeling, attack structure, cybersecurity, NETWORK SECURITY, mitigations, Detection, systems, os implementation, Digital Forensics,

Copyright © Kakao Corp. All rights reserved.

티스토리툴바