Stages of a serious hack effort
1.Footprinting
2.Scanning
3.Enumeration
4.Gaining access
5.Escalating privilege
6.Pilfering
7.Covering tracks
8.Creating backdoors
9.Denial of service
No comments:
Post a Comment