The following are the phases of malicious hacking:

1. Reconnaissance: In this phase, the attacker gathers information about the victim.
2. Scanning: In this phase, the attacker begins to probe the target for vulnerabilities that can be exploited.
3. Gaining Access: In this phase, the attacker exploits a vulnerability to gain access into the system.
4. Maintaining Access: In this phase, the attacker maintains access to fulfill his purpose of entering into the network.
5. Covering Tracks: In this phase, the attacker attempts to cover his tracks so that he cannot be detected or penalized under criminal law.

Explore More

EU Police learning hacking tricks. They are about to “Remote search” your PCs.

Law enforcement at European Union is working on ethical hacking proposal that will allow them to remotely access and monitor any PC without warrant. This is adopted after a decision

Weapons lab hacker escapes jail

A British schoolboy hacker has narrowly escaped jail after sparking a nuclear panic by keying into a top secret American weapons laboratory. Joseph McElroy, who was instead ordered to serve

Critical Blind SQL injection in ChartNexus.com

PlanetCreator has reported another critical Blind SQL Injection (vulnerability) on http://www.starinvestorrelations.com/ which owned by FiNEX Solutions Pte. Ltd. (“FiNEX Solutions”) powered by http://www.chartnexus.com/ This vulnerability has been alerted to :-