Main Steps Of A Cyber Attack
Fundamentally There Are Seven Steps Of A Cyber Attack:
![]() |
Step 1 : Reconnaissance
This is Step in which a hacker tries to identify the system and checks for vulnerability and
the best way to hack it (This process happens before the attack).
Step 2 : Scanning
After Reconnaissance, the next step is scanning in this step hacker tries to identify a weak point
that allows the hacker access to the system or gain some privilege.
Step 3 : Access and Escalation
After Scanning the hacker's next step is to gain access and then escalate privileges to allow the attacker to move freely within the environment. Once the attacker has access and privileges are escalated, they have effectively taken over your system.
Step 4 : Exfiltration
In this step the hacker now seeks data,sensitive information, logs and everything that he can possible get form the system and then hacker extracts this data to his/her server or any means to steal it.
Step 5 : Sustainment
In this step the hacker seeks to maintain the access for his use, the hacker might upload a backdoor or a root kits for this step and use it for his other malicious attacks.
Step 6 : Assault
In this step the hacker tries to block and disable security measures and legit users to the network.
By doing this it may be hard for the admin to get back the access and it gives the attacker more time to complete his/her mission or attack.
Step 7 : Obfuscation
In this step the hacker tries to hide his/her track or use confusing ways to make the forensic investigation hard, A hacker usually uses viruses, log cleaners, encryptions , spoofing, misinformation, backbone hopping, zombie accounts etc.
Comments
Post a Comment