Step 3 - Vulnerability Assessment

Information gained from Steps 1 and 2 complete the background requirements that allow a hacker to carry out a vulnerability assessment prior to exploiting the identified vulnerability. Hackers normally choose the path of least resistance when exploiting the vulnerabilities for an attack.

Protection: Seek specialist help to eliminate key weaknesses.