Greetings All, Typically, network based attacks have multiple stages. (reconnaissance, infection, download rootkit, call home, further infection etc)
Some attacks may have a single stage (without reconnaissance) to compromise a host. However, even those attacks have a post-compromise stage, such as call home or transfer/steal data or something else. Otherwise, what's the motivation for compromising in the first place? Can someone enlighten me if there are attacks that only have a single stage? Examples or scenarios is much appreciated. Thanks
