BEGIN:VCALENDAR
VERSION:2.0
CALSCALE:GREGORIAN
BEGIN:VEVENT
URL:https://www.learndesk.us/class/6529278948671488/lesson/6e09bae225740b550a07b8723c0cd758?ref=outlook-calendar
SUMMARY:Instructor Example
DTSTART;TZID=America/Los_Angeles:20260504T190000
DTEND;TZID=America/Los_Angeles:20260504T200000
LOCATION:https://www.learndesk.us/class/6529278948671488/lesson/6e09bae225740b550a07b8723c0cd758?ref=outlook-calendar
DESCRIPTION: 







How it happened: the technical details
Survey (Attackers will use any means available to find technical, procedural, or physical vulnerabilities that they can attempt to exploit.)
Delivery (During the delivery stage, the attacker will look to get into a position where they can exploit a vulnerability that they have identified, or they think could potentially exist.)
Affect (Depending on their motivation, the attacker may seek to explore your systems, expand their access, and establish a persistent presence (a process sometimes called ‘consolidation’).




As part of their survey of the victim’s network and services, attackers discovered that the corporate website was hosted by a service provider, and it contained a known vulnerability. In the survey stage of the attack on the service provider, the attackers exploited this vulnerability to add a specialized exploit delivery script to the corporate website. The script compared the IP addresses of the website’s visitors...

https://www.learndesk.us/class/6529278948671488/lesson/6e09bae225740b550a07b8723c0cd758?ref=outlook-calendar
STATUS:CONFIRMED
SEQUENCE:3
BEGIN:VALARM
TRIGGER:-PT10M
DESCRIPTION:Class Reminder
ACTION:DISPLAY
END:VALARM
END:VEVENT
END:VCALENDAR