CSO: The processes and tools behind a true APT campaign: Exploitation and Installation
Steve Ragan
22 January, 2014
This article is part of a series about APT campaigns. The other topics covered in this series are reconnaissance, weaponization and delivery, command and control, and exfiltration.
In part three of a series on understanding the processes and tools behind an APT-based incident, CSO examines the process of exploitation and installation. At this stage, things have started to go wrong, as the attacker(s) have been successful in delivering their malicious payload.
Click the URL above to read the full article
Votes:19