Tag: MITRE ATT&CK

An Anatomy of Common Attacks: From Phishing to Data Exfiltration

Networking from Scratch (lesson 12, the capstone) — the six stages of a typical intrusion (initial access, foothold, lateral movement, privilege escalation, C2 + persistence, exfil + impact), the protocols attackers actually use, and the highest-leverage defence at each stage. Closes out the foundation pathway.