Module 4

Engaging the Target

Now that we have done our reconnaissance and gained valuable information about our target we can move on to the next phase. This is where we engage with their systems and try to compromise them.  This can be done using Social Engineering as sometimes it is just easier to ask what someone's password is then guess it. We will also look at cryptography as passwords and other data might be encrypted and we might wish to see how can can try to gain access to this encrypted information.  Finally, we look at various system and network hacking techniques.