Known Vulnerabilities
Once you hear about a new exploit you will need to quickly find a POC for it and start mass scanning all of your targets for that vulnerability.
There are only three steps when using this approach:
Identifying technologies
Identifying the vulnerabilities
Finding the POC
Exploitation
Last updated