Analyzing an Attack (Part 3)

In part 2 of this series, we have left all the necessary information required for an attack on the victim's network.
In part 2 of this series, we have left all the necessary information required for an attack on the victim's network.
This series will be based on a network vulnerability. What will be introduced in the article is already a real attack, starting from reconnaissance to enumeration, exploiting network services and ending with exploitation strategies sending notifications. All these steps will be observed at the data packet level, and then explained in detail.
We showed you in part one the information that can be observed while opening the packet sequence sent by Nmap. The sequence sent starts with an ICMP echo response to determine if the computer or network has been assigned an IP address.