Part II Once the target is identified/determined attackers begin their tasks. Now we must understand, to launch an attack or gather information, they will rely
Category: Information Gathering
Information gathering is considered first and most important part before launching any types of attacks, hacking or penetration testing. Information gathering is known by several
Looking for reputation of an IP address is one of the most frequent task of an SOC analyst. There are number of online tools and