Attack Scenarios

Let’s go through several attack scenarios to show you how an attacker typically compromises a site. In reality, an attacker often performs several of these attacks in parallel, but we will break them out to make it easier to follow. To give you an idea of what attackers are doing to break into systems, the attacks range from non-technical to technical. Attackers will always take the path of least resistance to break into a system. This is why it is so important to look at all aspects of a company’s security. Just because a company has top-notch network security, does not mean that an attacker will not take advantage of a weakness in physical security.

These scenarios depict the range and type of attacks that are being performed ...

Get Hackers Beware now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.