Walkthroughs on Hacking Network Devices Tutorial 1 – Attack Methodology Welcome to module three of this workshop. We believe the previous two modules gave you more knowledge in “Attacking Network Devices”. This workshop has taken you through the core principles, and now we are in the module where you will gain some hands-on experience in attacking network devices. However, before you just start using the tools we mentioned in the previous module, you should understand the overall methodology in launching the attack. This methodology will take you from the initial steps to the launching of designated attacks. The attack vectors are different and there are many of them, however, we will be focused on what has been so far presented in the workshop. Attack Methodology Attack methodology is basically the designated steps to follow, these steps in a collective way are called the methodology. This is presented by many frameworks and industry standards cert...