1 00:00:06,850 --> 00:00:07,850 - [Instructor] By now you know 2 00:00:07,850 --> 00:00:10,630 that there's no system or software 3 00:00:10,630 --> 00:00:13,190 that is actually immune to vulnerabilities. 4 00:00:13,190 --> 00:00:16,310 This is why patch management is so critical 5 00:00:16,310 --> 00:00:20,300 to the quality of the overall security 6 00:00:20,300 --> 00:00:22,210 for an organization, right? 7 00:00:22,210 --> 00:00:24,620 Many attacks seen in the world, 8 00:00:24,620 --> 00:00:26,980 leverage non vulnerabilities. 9 00:00:26,980 --> 00:00:29,970 The worst part is that in many cases 10 00:00:29,970 --> 00:00:33,360 there's actually a patch to actually fix that vulnerability 11 00:00:33,360 --> 00:00:36,530 as well as things like IPS signatures 12 00:00:36,530 --> 00:00:39,870 and mitigations available to prevent the vulnerability 13 00:00:39,870 --> 00:00:42,050 for being exploited, right? 14 00:00:42,050 --> 00:00:44,740 Now once the exploitation completes 15 00:00:44,740 --> 00:00:46,630 something needs to be done 16 00:00:46,630 --> 00:00:48,690 following the successful exploitation, right? 17 00:00:48,690 --> 00:00:52,090 So adversaries don't need to exploit system 18 00:00:52,090 --> 00:00:53,910 just to see if it can be done. 19 00:00:53,910 --> 00:00:56,450 Typically, something is delivered 20 00:00:56,450 --> 00:00:59,170 through the exploitation process, which lead us 21 00:00:59,170 --> 00:01:01,523 to the next step in the kill chain process.