Harry, a professional hacker, targets the IT infrastructure of an organization. After preparing for the attack, he attempts to enter the target network using techniques such as sending spear-phishing emails and exploiting vulnerabilities on publicly available servers. Using these techniques, he successfully deployed malware on the target system to establish an outbound connection.
What is the APT lifecycle phase that Harry is currently executing?
Vincent_Lu
Highly Voted 1 year, 4 months agoeli117
Most Recent 1 month, 4 weeks agosunce12
5 months agoNicknp
6 months, 2 weeks agoinsaniunt
12 months agoYonGCybeR
1 year agoIPconfig
1 year, 1 month agopawnpusher
1 year, 2 months agoI_Know_Everything_KY
9 months, 2 weeks agosringan
1 year, 1 month agojeremy13
1 year, 7 months agojeremy13
1 year, 6 months agoqtygbapjpesdayazko
8 months, 2 weeks ago