Discover how attackers target your networks and evasion methods they may use. Buffer overflow, malware, port scanning, host profiling, encryption and tunneling, resource exhaustion, traffic fragmentation, and pivot attacks are covered.
SECFND: Attacks and Evasion
- describe endpoint attacks and how buffer overflows, malware, rootkits, port scanning, and host profiling are used to attack an endpoint
- describe evasion methods that attackers can use to avoid detection like tunneling, protocol misinterpretation, and traffic substitution