Cylabs
Ctrlk
  • 😊Welcome to CyLabs
  • 101 Series
  • Introduction to Cyber Security Operations
  • Cyber Security Assessment
    • Planning and Scoping
    • Reconnaissance
    • Enumeration
    • Vulnerability Assessment and Management
    • Exploitation
      • Attack Surface and Target Prioritization
        • High Valued Assets and Identification
        • Vulnerability Metrics
        • End of Life Softwares
        • Default Configuration
        • Running Services
        • Vulnerable Encryption Methods
        • Defensive Capabilities
        • Attack Path
      • Attack Types
      • Host Based Attacks
      • Authentication Attacks
      • Vulnerable Encryption Methods
      • Tools
      • Password Attacks
    • Lateral Movement
    • Post Exploitation
    • Reporting
  • Cybersecurity Frameworks and Standards
  • Security Domains
  • Operational Security
  • Industry Specific Security:Case Studies
  • Computational Science
  • Data Engineering
  • AI/ML and Data Science
  • Application Development
  • Radom Topics :)
  • CISSP
Powered by GitBook
On this page

Was this helpful?

  1. Cyber Security Assessment
  2. Exploitation

Attack Surface and Target Prioritization

High Valued Assets and IdentificationVulnerability MetricsEnd of Life SoftwaresDefault ConfigurationRunning ServicesVulnerable Encryption MethodsDefensive CapabilitiesAttack Path
PreviousExploitationNextHigh Valued Assets and Identification

Was this helpful?