-
Q: What is the 'HP Attack Life Cycle'?A: A modified Kill Chain model.
-
Q: What is 'Reconnaissance'?A: Gathering info on the target.
-
Q: What is 'Weaponization'?A: Creating the exploit.
-
Q: What is 'Delivery'?A: Sending the exploit to the target.
-
Q: What is 'Exploitation'?A: Triggering the vulnerability.
-
Q: What is 'Installation'?A: Installing malware/backdoor.
-
Q: What is 'C2'?A: Command and Control.
-
Q: What is 'Actions on Objectives'?A: Stealing data or causing damage.
-
Q: What is 'Lateral Movement'?A: Moving between systems.
-
Q: What is 'Persistence'?A: maintaining access.
Ask a question
Have a doubt or need clarification?
I’m here to help. Share your question, and I’ll get back to you with the guidance you need regarding the course.
Thank you!
I have received your message and I shall get back to you shortly.