Harry, a professional hacker, targets the IT infrastructure of an organization. After preparing for the attack, he attempts to enter the target network using techniques such as sending spear-phishing emails and exploiting vulnerabilities on publicly available servers. Using these techniques, he successfully deployed malware on the target system to establish an outbound connection.
What is the APT lifecycle phase that Harry is currently executing?
Vincent_Lu
Highly Voted 1 year, 9 months agoMann098
Most Recent 4 months agoeli117
7 months, 1 week agosunce12
10 months, 2 weeks agoNicknp
12 months agoinsaniunt
1 year, 5 months agoYonGCybeR
1 year, 5 months agoIPconfig
1 year, 6 months agopawnpusher
1 year, 8 months agoI_Know_Everything_KY
1 year, 2 months agosringan
1 year, 6 months agojeremy13
2 years agojeremy13
2 years agoqtygbapjpesdayazko
1 year, 1 month ago