Slide 6
Slide 6 text
1. Reconnaissance
– Google Hacking, Reversed Whois, AXFR ……
2. Scanning
– SYN/ACK Scan, TCP NULL/FIN/Xmas/Mainmon/Window
Scan, SCTP INIT Scan, Hydra, Nessus ……
3. Gaining Access
– Heap/Stack/V-table Overflow, ROP, Heap Spray, System
Misconfiguration, Metasploit, Exploit Database ……
4. Maintaining Access
– Privilege Escalation, Trojan, Backdoor, Rootkit, Code/DLL
Injection, API Hook, LD_PRELOAD, Anti AV/Debugger ……
5. Clearing Tracks
– Syslog, WTMP/UTMP, Event Log, Shell(Bash/Explorer) ……