Gaining Access
Overview
The gaining access phase is the phase where the vulnerability is exploited with tools designed to circumvent controls that may be in place to mitigate against malicious tools.
Gaining access is instrumental to the entire process.
Vulnerable Resources
There are many vendors and open source repositories that can be used to research vulnerabilities.
The national Vulnerability Database (NVD) is a repository of vulnerabilities. You can search statistics as well as get full listings of vulnerabilities. Another open source repository is the Exploit Database.
The Exploit Database is a repository of vulnerabilities that is broken down andsorted. You can sort the data to give you the latest exploits that have a high likelihood of not being mitigated or covered via patching.
https://www.solvedcollegepapers.com/product/cmit-321-gaining-access-plan
https://www.solvedcollegepapers.com/product/cmit-321-project-1