The following are the phases of malicious hacking:

1. Reconnaissance: In this phase, the attacker gathers information about the victim.
2. Scanning: In this phase, the attacker begins to probe the target for vulnerabilities that can be exploited.
3. Gaining Access: In this phase, the attacker exploits a vulnerability to gain access into the system.
4. Maintaining Access: In this phase, the attacker maintains access to fulfill his purpose of entering into the network.
5. Covering Tracks: In this phase, the attacker attempts to cover his tracks so that he cannot be detected or penalized under criminal law.

Explore More

Webmasters misery after the website got hacked; Google sandbox, Hosting dismissal and much more

Hello, I run a websites on graphics design, greeting cards and website design. Most of the items are free for visitors and I make my money from advertisement using Adsense.

Cyber Forensics Workshop in Myanmar

I’m here to invite all of my cyber warriors! My friend U Aung Zaw Myint, Principal of M.S.T Computer Center , EC-Council’s Asia Pacific Academia Partner in Myanmar is going

How to “become” a google bot

What you’ll need: Firefox, The Modify Headers extension for firefox. What you can do: Many sites allow google to look into their forums, in order to get more traffic by