Important Questions attackers ask when choosing a target

Six important questions attackers ask when choosing a target — by Alessandro Civati
  • Enumerability: What useful information about a target can be seen from outside?
  • Criticality: How valuable is the asset?
  • Weakness: Is an asset generally exploitable.
  • Post-Exploitation Potential: How hospitable is the asset once exploited?
  • Research Potential: How much time does it take to develop an exploit?
  • Applicability: Will there be a repeatable ROI from a created exploit?

LutinX digitally protect your idea, skills and values. We are an Hybrid Blockchain Platform KYC & AML Compliance with multiple Blockchain APPs in a single SUITE

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Keyless Crypto: How Do Bob, Alice and Carol Share A Secret Message?

Threat Intelligence

The League Table of Post Quantum Cryptography (PQC)

{UPDATE} 俺のナイン 一 最強のおかずで甲子園を目指せ Hack Free Resources Generator

Reviewing TLS mastery

TLS mastery book cover with Tux

How Can Anti Virus Software Protect Your Whole Home, Contents Included?

The six major technology trends of 2020

Big Airdrop | NEW $SIW AIRDROP CAMPAIGN

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
LutinX Inc.

LutinX Inc.

LutinX digitally protect your idea, skills and values. We are an Hybrid Blockchain Platform KYC & AML Compliance with multiple Blockchain APPs in a single SUITE

More from Medium

Clouds as an escape from earthly woes

From Mall Cop to Cybersecurity

Epic Women in Cyber — Jaspreet Kaur

What is a SIEM and why do I need one?