Monday, March 29, 2010

HACKING EXPOSED

Stages of a serious hack effort
1.Footprinting
2.Scanning
3.Enumeration
4.Gaining access
5.Escalating privilege
6.Pilfering
7.Covering tracks
8.Creating backdoors
9.Denial of service

No comments:

Post a Comment