Hackers Aren’t Magicians, They Just Know the Right Questions to Ask

Photo by Brendan Church on Unsplash

Attackers have a checklist for evaluating a new target, and pro-tip: it doesn’t only have to do with the highest severity vulnerabilities

Attributes an attacker weights to determine what to hack: Target Temptation
There are too many “high severity” vulns to evaluate. Source: Rapid7 Blog
VoIP Phone

--

--

moose. co-founder @randori. red-teamer. security can’t be fixed. practice how you fight. www.randori.com

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
David Wolpoff (moose)

moose. co-founder @randori. red-teamer. security can’t be fixed. practice how you fight. www.randori.com