The following are the phases of malicious hacking:

  1. Reconnaissance: In this phase, the attacker gathers information about the victim.
  2. Scanning: In this phase, the attacker begins to probe the target for vulnerabilities that can be exploited.
  3. Gaining Access: In this phase, the attacker exploits a vulnerability to gain access into the system.
  4. Maintaining Access: In this phase, the attacker maintains access to fulfill his purpose of entering into the network.
  5. Covering Tracks: In this phase, the attacker attempts to cover his tracks so that he cannot be detected or penalized under criminal law.

Explore More

Hacker Halted Asia Pacific 2010

2010. Entering the new decade, have we done enough to secure our information? Or will we be found wanting by the end of this decade? History is a great teacher,

XSS Shell

This script in asp permettedi executing of the commandos taking advantage of a bug of the XSSper greater info you can see the video: Code: http://ferruh.mavituna.com/xssshell/demo/ and the shell: Code:

phishing tutorial

1.You can use this same tut for anything else… 2. Go to http://www.rapidshare.com and navigate to the premium account log-in screen at the url : https://ssl.rapidshare.com/cgi-bin/premiumzone.cgi 3. We will now