Malicious Hacker Strategies :
As there are steps to develop any software so as Every hackers do follow some predefined rules or steps to hack into the system. They are
1>Reconnaissance:- The basic information gathering about the target system.
2> Scanning:- Scanning the target system for open ports and services running on the open ports etc.
3> Gaining Access:- Gaining the actual access of the particular target system by exploiting the system.
4> Maintaining Access:- Keeping the access of the system even after leaving the system so as not to perform all the steps from the scratch.
5>Clearing Tracks:- To remove the footprints if any so as to remain undetected from the victim.
No comments:
Post a Comment