Source: https://repo.zenk-security.com/Techniques d.attaques . Failles/Audit d un systeme d information.pdf