Email Login| Link Exchange | Cyber News | Phishing Attack | SQL Injection | SEO | DOS Attack | Hacking Tools | |Hacking Tricks | Penetration Testing | Trojans & Keyloggers |Hacking Videos | General Discussion | Website Hacking | Session Hijacking | Social Engineering | Anonymous Surfing | Recover Passwords | Bypass Firewall | Hacking Books | Network Sniffers | Password Cracking | Enumerating & Fingerprinting | Movies & Songs

Share This Post With Your Friends

Tuesday, March 31, 2009

Hacking Phase 4 - Maintaining Access

Phase 4 - Maintaining Access
  • Maintaining Access refers to the phase when the hacker tries to retain his 'ownership' of the system.

  • The hacker has exploited a vulnerability and can tamper and compromise the system.

  • Sometimes, hackers harden the system from other hackers as well (to own the system) by securing their exclusive access with Backdoors, RootKits, Trojans and Trojan horse Backdoors.

  • Hackers can upload, download or manipulate data / applications / configurations on the 'owned' system.

0 Visitor Reactions & Comments: