Please enable JavaScript.
Coggle requires JavaScript to display documents.
Cycle of Hacking (3) Gaining Access (Design blueprint of the network of…
Cycle of Hacking
3) Gaining Access
Design blueprint of the network of the target with help of data collected during phase 1 and phase 2.
Vulnerabilities discovered during the reconnaissance and scanning phase are now exploited to gain acceess
Method of connection the hacker uses for an exploit can be local area network, local access to a PC, the internet or offline.
-
1) Reconnaissance
-
-
Include the target organization`s clients, employees, operations, network and system.
4) Maintaining Access
-
Securing their exclusive access with backdoors, rootkits and Trojans.
Once hacker own the system, they can use a base to launch additional attacks.
2) Scanning
-
Tools may include dialers, port scanners, network mappers, sweepers and vulnerabilities scanners.
Seeking any information that can help them perpetrate attack such as computer names, IP adresses, user account
5) Clearing Track
Cover their track to avoid detection by security personnel to continue to use the owned system, to remove evidence of hacking or to avoid legal action.
Hacker trying to remove all traces of the attacks such as log file or intrusion detection system (IDS) alarms.