My Image

7 Steps of Hacking

The routine (more commonly known as 7 Steps of Hacking) of an infiltration can generally be broken down as follows:

  1. Information discovery - Attackers find as much information as possible on their target.
  2. Target scanning - Different points of attack are identified.
  3. Vulnerability assessment - The easiest point of attack is selected.
  4. Exploiting the weakness - The attacker gains access to the network.
  5. Privilege escalation - The intruder gains greater access by escalates their privileges.
  6. Retaining access - This allows the attacker to gain access at any time in the future.
  7. Covering tracks - Finally, any sign the system has been exploited must be concealed.

Click here to watch a short video of how hackers attempt to infiltrate businesses


Steve Mac Media Limited - 7592963

Trading Address & Registered Office: 90-92 King Street, Maidstone, Kent, ME14 1BH