The following are the phases of malicious hacking:

  1. Reconnaissance: In this phase, the attacker gathers information about the victim.
  2. Scanning: In this phase, the attacker begins to probe the target for vulnerabilities that can be exploited.
  3. Gaining Access: In this phase, the attacker exploits a vulnerability to gain access into the system.
  4. Maintaining Access: In this phase, the attacker maintains access to fulfill his purpose of entering into the network.
  5. Covering Tracks: In this phase, the attacker attempts to cover his tracks so that he cannot be detected or penalized under criminal law.

Explore More

What Is a Hacker?

Hacker is one of those terms that has a different meaning depending on who uses it. Among programmers, to be a hacker is to be a star. Hackers are programming

Friendster accounts hacking menace

Someone asked us recently how to hack a Friendster account. Of course, we refused point blank as hacking is not only illegal, it is utterly loathsome. It is none of

What are the security holes in the Basic Authentication scheme?

The Basic Authentication scheme uses the username and password and encrypts the password using base64 encoding. In spite of this, there are still many security holes in the Basic Authentication