Harry, a professional hacker, targets the IT infrastructure of an organization. After preparing for the attack, he attempts to enter the target network using techniques such as sending spear-phishing emails and exploiting vulnerabilities on publicly available servers. Using these techniques, he successfully deployed malware on the target system to establish an outbound connection.
What is the APT lifecycle phase that Harry is currently executing?
cerzocuspi
Highly Voted 2 years agoDaniel8660
Most Recent 6 months, 3 weeks agoJasonxxx
1 year, 4 months agoANDRESCB1988
1 year, 9 months agoamericaman80
2 years ago