Nov 14, 2014
I found a great bit of reading that walks you through the
“plays” of hacking – enumeration, exploitation, post-exploitation,
etc. It’s a great (and affordable) book called The Hacker Playbook.
Cheggitowt! Download: 7MS #34: The Hacker Playbook (audio)