Ayo Secu

  • 홈
  • 태그
  • 방명록

execution 1

Execution

ExecutionIn the execution phase of an attack, the attacker runs malicious code on a system to achieve their objectives, which may include establishing persistence, gaining privileges, or preparing for lateral movement. Execution techniques range from using various shells and interpreters to leveraging scheduled tasks or system management tools like WMI on Windows systems.1. Shells & Interpreters..

Security Terms/Attack Structure 2025.01.16
이전
1
다음
더보기
  • 분류 전체보기 (144)
    • Security Terms (144)
      • Threat Modeling (5)
      • Attack Structure (14)
      • Exploits (5)
      • Detection (11)
      • Incident Management (6)
      • Digital Forensics (7)
      • Network Security (35)
      • Web Application (22)
      • Cryptography, Authenticatio.. (8)
      • Infrastructure Virtualizati.. (9)
      • OS Implementation and Syste.. (8)
      • Mitigations (10)
      • Malware Reversing (4)

Tag

attack structure, incident management, threat modeling, NETWORK SECURITY, cybersecurity, os implementation, Authentication, security, forensic, web application, network, mitigations, identity, systems, Exploit, infrastructure virtualization, Digital Forensics, security terms, Detection, Cryptography,

Copyright © Kakao Corp. All rights reserved.

티스토리툴바