The following are the phases of malicious hacking:

  1. Reconnaissance: In this phase, the attacker gathers information about the victim.
  2. Scanning: In this phase, the attacker begins to probe the target for vulnerabilities that can be exploited.
  3. Gaining Access: In this phase, the attacker exploits a vulnerability to gain access into the system.
  4. Maintaining Access: In this phase, the attacker maintains access to fulfill his purpose of entering into the network.
  5. Covering Tracks: In this phase, the attacker attempts to cover his tracks so that he cannot be detected or penalized under criminal law.

Explore More

Hacker Must Be Knowing

Things Which A Wannabe Hacker Must Be Knowing! Open Source Software Disadvantages Open Source software can be downloaded and analysed manually and locally on the attackers’ host. If it is

Wake up Adobe; we love your Flash player but not Trojans

Virus developers are taking advantage of the enormous popularity of the Adobe flash player and creating fake Adobe Flash player which installs Trojan horse designed to steal password and personal

Gmail/ Google apps down!

Gmail and Google apps are down for almost 2 hours now. News, reader etc are working fine. Everyone getting 502/503 after few minutes n loading the page. Nothing official from