O'Reilly logo

Cisco Router and Switch Forensics by Dale Liu

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7. Understanding the Methods and Mindset of the Attacker

Solutions in this chapter:

▪ Information Gathering
▪ Scanning and Probing
▪ Exploiting Weaknesses
▪ Maintaining Access
▪ Covering Tracks
▪ The Incident
Summary
Solutions Fast Track
Frequently Asked Questions

Introduction

The purpose of this chapter is not to turn investigators into hackers. Investigators often live on the opposite end of the spectrum, having to find out how the network was compromised. The best approach to understanding the mindset of a hacker is to think like one. This chapter will provide you with some insight into the typical hacker's attack plan, as well as inform you about some of the tools of his trade. If you understand the methodology of how a hacker attacks a network, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required