Intruder Trends
Leveraging use of currently available technologies
Creating easy-to-use exploitation scripts
Developing increasingly sophisticated toolkits
Transferring expertise to novices
Increasing impact by targeting the infrastructure
Previous slide
Next slide
Back to first slide
View graphic version