The following are the phases of malicious hacking:

  1. Reconnaissance: In this phase, the attacker gathers information about the victim.
  2. Scanning: In this phase, the attacker begins to probe the target for vulnerabilities that can be exploited.
  3. Gaining Access: In this phase, the attacker exploits a vulnerability to gain access into the system.
  4. Maintaining Access: In this phase, the attacker maintains access to fulfill his purpose of entering into the network.
  5. Covering Tracks: In this phase, the attacker attempts to cover his tracks so that he cannot be detected or penalized under criminal law.

Explore More

US Army banned the use of USB drives from its computers

They say they are the most powerful; they have their units in many countries; they attack anywhere on the globe; they have hundreds of spies and spy satellites all around

Fake Login Page with XSS – IFRAME – | C B Bank – Online Electricity Billing Payment System(GBPS)

When XSS vulnerabilities on bank websites are exploited by phishers, is too late to undo the unwanted consequences. The phishers were able to inject a modified login form onto the

critical XSS Vulnerability on Gadone (beta) MM Search Engine

PlanetCreator has reported another critical XSS Vulnerability on Gadone (beta) MM Search Engine : http://www.gadone.com This vulnerability has been informed to :- webmaster Cross-site scripting (XSS) is a type of