Harry, a professional hacker, targets the IT infrastructure of an organization. After preparing for the attack, he attempts to enter the target network using techniques such as sending spear-phishing emails and exploiting vulnerabilities on publicly available servers. Using these techniques, he successfully deployed malware on the target system to establish an outbound connection.
What is the APT lifecycle phase that Harry is currently executing?
Vincent_Lu
Highly Voted 2 years, 1 month agoMann098
Most Recent 7 months, 2 weeks agoeli117
10 months, 3 weeks agosunce12
1 year, 1 month agoNicknp
1 year, 3 months agoinsaniunt
1 year, 8 months agoYonGCybeR
1 year, 9 months agoIPconfig
1 year, 10 months agopawnpusher
1 year, 11 months agoI_Know_Everything_KY
1 year, 6 months agosringan
1 year, 10 months agojeremy13
2 years, 4 months agojeremy13
2 years, 3 months agoqtygbapjpesdayazko
1 year, 5 months ago