Please enable JavaScript.
Coggle requires JavaScript to display documents.
Hacking Phases (Scanning (Pre-Attack Phase (Scanning is considered the…
Hacking Phases
Scanning
set of procedures for identifying live hosts, ports, and services, discovering Operating system and architecture of target system, Identifying vulnerabilities and threats in the network
-
Pre-Attack Phase
Scanning is considered the second pre-attack phase. Scanning is the active step of attempting to connect to systems to elicit a response.
-
Extract Information
Attackers extract information such as computer names, IP address, and user accounts to launch attack.
Gaining Access
-
The attacker can gain access at the OS level, application level, or network level.
-
-
Reconnaissance
Passive
-
Example: Searching public records or news releases include sniffing,
information gathering .
Active
-
Involves interacting with the target directly by any means
Example: telephone calls to the help desk or technical department
Clearing Track
-
Continuing access the victim’s system, remaining unnoticed and uncaught, deleting evidence that might lead prosecution.