14.4. Summary

In this chapter we discussed some of the ways an attacker might go about attacking your network. We started by looking at how an attacker can collect information about your network with little more than your organization's name. We then discussed how an attacker could go about collecting even more information about your specific network environment in order to determine which vulnerabilities might be exploitable. Finally, we looked at some of the assault methods available to an attacker who wants to compromise your resources.

In the next chapter, we will discuss how to stay ahead of these attacks. We will look at how to stay informed of the exploits that have been found—and how to find your vulnerabilities before an attacker does. ...

Get Mastering™ Network Security, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.