information-gathering – important but often enough not considered

An attack starts at that point, where you are scanning the server, you are testing the wlan, plug in the RasPi in the network jack ……. Sorry, that’s wrong. An effective attack starts earlier, it starts with the information gathering, collecting enough and reliable informations. Is there only one hardened webserver or are there other … Continue reading "information-gathering – important but often enough not considered"

Read More