What are the common attack flows in order
What does the second phase of the common attack flow do
Reconnaissance generates a payload and then delivers a payload
What is the third common attack in the attack flow
Exploit & Execute
What is the purpose of the reconnaissance
Scan vulnerabilities
The weakness we take advantage of
Vulnerability
Our weapon, what we will send to access their system
Payload
What happens when they click the button or access the payload
Exploit
Software we use to deliver our tool
Malware
Persistence mechanism; a way to get back into the system
Backdoor