Intelligence Gathering – from Reconnaissance to Exploitation

Back in the days as a security consultant, I was in charge of conducting various tasks such as security audits, security controls integration and more. The ones I enjoyed the most were penetration tests which demonstrate if and how can an attacker breach a target customer. Long story short, I was getting paid to break things so what is not to like? Most of the attacks have an upper limit in the form of time limitation. This limitation affects its
- Intelligence Gathering – from Reconnaissance to Exploitation

Read more