The following are the phases of malicious hacking:

  1. Reconnaissance: In this phase, the attacker gathers information about the victim.
  2. Scanning: In this phase, the attacker begins to probe the target for vulnerabilities that can be exploited.
  3. Gaining Access: In this phase, the attacker exploits a vulnerability to gain access into the system.
  4. Maintaining Access: In this phase, the attacker maintains access to fulfill his purpose of entering into the network.
  5. Covering Tracks: In this phase, the attacker attempts to cover his tracks so that he cannot be detected or penalized under criminal law.

Explore More

How to hack a website? – Tips and tricks

Here are the most common techniques used to hack a website Hacking sites that are least protected by password – By pass authentication It’s the webmaster’s nightmare, hackers accessing the

Critical SQL Injection in Myanmar Teleport – Myanmar Internet Service Provider (formerly known as BaganNet)

PlanetCreator has reported another critical SQL Injection (vulnerability) on Myanmar Teleport – Myanmar Internet Service Provider (formerly known as BaganNet) http://www.myantel.net.mm/ SQL injection is a code injection technique that exploits

Cyber Attacks to Myanmar Media Sites

Last September 28, BurmeseHackers Group Hacked Irrawaddy Online Store twice, and we’ve been discussed about that. After a month, 27/09/2010: Irrawaddy, Mizzima and the Democratic Voice of Burma (DVB), were