Phase 6 – Ex-filtration, corruption, and disruption 

In this final stage of attack, the escalated permissions are used to transfer data out of the network, also known as ex-filtration. They steal sensitive data from the organization and corrupt critical resources. Often, the disruption could also include deleting entire file systems.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset