hello, how are you all
please i need a help
i read sooo much about that but i am not satisfied yet, because i am not reach to what i exactly want to know
i want to know what are the abilities of the attacker in the computers he compromise?
in other words, what are the port he use (rigestered or ephemeral), and does he can see and control other ports in the compromised computer?
for example if he send a request to a web site that require user interaction, can he reply to it or not?
or for another example could he solve the random code that appeare as a request in some pages?
please if any one can answer me or lead me to a useful link, i will be very Grateful
best regards
and thank you in advance