Hands-On Red Team Tactics
上QQ阅读APP看书,第一时间看更新

Exploitation

This is a process of gaining access to the system by evading the protection mechanism on the system based on the vulnerability assessment. Exploits can be public, or a zero day.