Harry, a professional hacker, targets the IT infrastructure of an organization. After preparing for the attack, he attempts to enter the target network using techniques such as sending spear-phishing emails and exploiting vulnerabilities on publicly available servers. Using these techniques, he successfully deployed malware on the target system to establish an outbound connection.
What is the APT lifecycle phase that Harry is currently executing?
Vincent_Lu
Highly Voted 1 year, 9 months agoMann098
Most Recent 3 months, 3 weeks agoeli117
6 months, 4 weeks agosunce12
10 months agoNicknp
11 months, 2 weeks agoinsaniunt
1 year, 4 months agoYonGCybeR
1 year, 5 months agoIPconfig
1 year, 6 months agopawnpusher
1 year, 7 months agoI_Know_Everything_KY
1 year, 2 months agosringan
1 year, 6 months agojeremy13
2 years agojeremy13
1 year, 11 months agoqtygbapjpesdayazko
1 year, 1 month ago