The following are the phases of malicious hacking:

1. Reconnaissance: In this phase, the attacker gathers information about the victim.
2. Scanning: In this phase, the attacker begins to probe the target for vulnerabilities that can be exploited.
3. Gaining Access: In this phase, the attacker exploits a vulnerability to gain access into the system.
4. Maintaining Access: In this phase, the attacker maintains access to fulfill his purpose of entering into the network.
5. Covering Tracks: In this phase, the attacker attempts to cover his tracks so that he cannot be detected or penalized under criminal law.

Explore More

Make your own Hardend Internet Firewall

Make your own “Hardend Internet Firewall” using that forgotton PC in your basement. Yes.. You know the PC I am talking about. We all have them. Remember that $3000 Pentium

What are worms?

Worms are programs that replicate themselves from one system to another without using a host file. Although in most cases worms exist inside files, such as Word or Excel documents,

Blind SQL Injection

Blind injection: you dont actually see anything, you just see how the server responds.Blind injection is a little more complicated/time consuming, but when your injection is multi-select and union isn’t