Skip to main content

Posts

Showing posts from April, 2017

Attacking Network Device PART - 3

Walkthroughs on Hacking Network Devices Tutorial 1 – Attack Methodology    Welcome to module three of this workshop. We believe the previous two modules gave you more knowledge in “Attacking Network Devices”. This workshop has taken you through the core principles, and now we are in the module where you will gain some hands-on experience in attacking network devices.    However, before you just start using the tools we mentioned in the previous module, you should understand the overall methodology in launching the attack. This methodology will take you from the initial steps to the launching of designated attacks. The attack vectors are different and there are many of them, however, we will be focused on what has been so far presented in the workshop. Attack Methodology   Attack methodology is basically the designated steps to follow, these steps in a collective way are called the methodology. This is presented by many frameworks and industry standards certifications.   Methodological