Please enable JavaScript to use CodeHS

NCMF: 6.2.3c

CodeHS Lessons

Weaponization is the second stage. Based on the information obtained through reconnaissance, the adversary will tailor their toolset to meet the specific requirements of the target network. This often includes coupling remote access with an exploit into a deliverable payload.

This standard does not have any mappings to our lessons yet.