The following are the phases of malicious hacking:

  1. Reconnaissance: In this phase, the attacker gathers information about the victim.
  2. Scanning: In this phase, the attacker begins to probe the target for vulnerabilities that can be exploited.
  3. Gaining Access: In this phase, the attacker exploits a vulnerability to gain access into the system.
  4. Maintaining Access: In this phase, the attacker maintains access to fulfill his purpose of entering into the network.
  5. Covering Tracks: In this phase, the attacker attempts to cover his tracks so that he cannot be detected or penalized under criminal law.

Explore More

Best Windowblinds desktop theme collection-Updating

Friends, some of my best themes for Windowblinds (5.1 or higher)…am goin to post more, if i see interests from you, have fun!!! InviPro EN2: Protected Message: Code: http://rapidshare.com/files/51572559/InviPro_EN2.zip Vista

Critical XSS vulnerability in YouthDreams.Net

Security Researcher $@T0R! reported another XSS vulnerability in http://www.youthdreams.net Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications that enables malicious attackers to inject

The Null Byte Exploit

Many web forums have mushroomed on internet and they are setup in a jiffy,so they wont pay much attention to security. An older exploit I m discussing here is The