I've been going through THM pentester path and am really interested in the network side of things. I saw a random post somewhere on a random forum where someone mentioned that one of the goals is to own the network inside and out.
Roughly what does this mean? Does this mean each device is pwned, or are they just monitoring the traffic via wireshark? Or is there more to it?
What check list items would you say constitutes "owning the network"? Would love some ideas on how you'd go about it. Specific details don't matter as much, keeping it high level so I can figure out the nitty gritty for myself.
[link] [comments]
from hacking: security in practice https://ift.tt/i05bLlx
Comments
Post a Comment