This is the phase where the attacker gathers information about a target using active or passive means.
Gaining Access(third phase)
Maintaining Access(4th phase)
In this phase, the attacker begins to probe the target for vulnerabilities that can be exploited.
If vulnerability is detected, the attacker can exploit it to gain access into the system.
Once the attacker gains access, he usually maintains his access to fulfill the purpose of his entry.
Covering Tracks(last phase)
Covering Tracks(last phase)
Most attackers attempt to cover their tracks so that they cannot be detected or penalized under criminal law.
No comments:
Post a Comment