Skip to main content

General Attack Strategies

What are the most common methods attackers use to conduct an exploit?

Attack Strategy Description
Reconnaissance Gathering information about an organization. Includes system hardware info, network configurations, and individual user information.
Social Engineering Manipulating others into providing sensitive information, including using intimidation and sympathy.
Technical Approaches Port scanning or ping sweeping.
System Breaching Penetrating the system defenses, using the information gathered during reconnaissance.
Escalate Privileges Give yourself admin permissions once you've penetrated the network.
Create a Backdoor Leave a way for you to penetrate the system once you're in.
Stage Computers Add additional software in neighbor systems that enable you to penetrate again and again.
Exploit Vulnerabilities Commit the crime part of cybercrime. Steal private data, deny internal services, crash systems, and alter configurations.