Main Steps Of A Cyber Attack

Fundamentally There Are Seven Steps Of A Cyber Attack:





Step 1 : Reconnaissance

This is Step in which a hacker tries to identify the system and checks for vulnerability and
the best way to hack it (This process happens before the attack).

Step 2 : Scanning

After Reconnaissance, the next step is scanning in this step hacker tries to identify a weak point
that allows the hacker access to the system or gain some privilege.

Step 3 : Access and Escalation


 After Scanning the hacker's next step is to gain access and then escalate privileges to allow the attacker to move freely within the environment. Once the attacker has access and privileges are escalated, they have effectively taken over your system.


Step 4 : Exfiltration

 In this step the hacker now seeks data,sensitive information, logs and everything that he can possible get form the system and then hacker extracts this data to his/her server or any means to steal it.

Step 5 : Sustainment

In this step the hacker seeks to maintain the access for his use, the hacker might upload a backdoor or a root kits for this step and use it for his other malicious attacks.

Step 6 : Assault

In this step the hacker tries to block and disable security measures and  legit users to the network.
By doing this it may be hard for the admin to get back the access and it gives the attacker more time to complete his/her mission or attack.

Step 7 : Obfuscation

In this step the hacker tries to hide his/her track or use confusing ways to make the forensic investigation hard, A hacker usually uses viruses, log cleaners, encryptions , spoofing, misinformation, backbone hopping, zombie accounts etc.

Comments

Popular posts from this blog

What is Geographic Information Systems (GIS)

Top 5 Text Editors Programmers Use!