The following are the phases of malicious hacking:

1. Reconnaissance: In this phase, the attacker gathers information about the victim.
2. Scanning: In this phase, the attacker begins to probe the target for vulnerabilities that can be exploited.
3. Gaining Access: In this phase, the attacker exploits a vulnerability to gain access into the system.
4. Maintaining Access: In this phase, the attacker maintains access to fulfill his purpose of entering into the network.
5. Covering Tracks: In this phase, the attacker attempts to cover his tracks so that he cannot be detected or penalized under criminal law.

Explore More

What are the countermeasures against database attacks?

The following are the countermeasures against database attacks: * Input Sanitization: The Database Administrator must sanitize any input received from a user. The data submitted should be checked for data

NMAP Tutorial

So… let’s say that you donwloaded NMAP in one of its latest versions, if you didn’t then go get it immediately! And come back only when you have it. http://nmap.org/download.html

How to Hack Windows XP Computer Passwords

1. Know that if you are still logged on to the Administrator account you can change user profiles using the following steps. * Go to the green “Start Button” and