Skip to main content

General Attack Strategies

What are the most common methods attackers use to conduct an exploit?

Attack StrategyDescription
ReconnaissanceGathering information about an organization. Includes system hardware info, network configurations, and individual user information.
Social EngineeringManipulating others into providing sensitive information, including using intimidation and sympathy.
Technical ApproachesPort scanning or ping sweeping.
System BreachingPenetrating the system defenses, using the information gathered during reconnaissance.
Escalate PrivilegesGive yourself admin permissions once you've penetrated the network.
Create a BackdoorLeave a way for you to penetrate the system once you're in.
Stage ComputersAdd additional software in neighbor systems that enable you to penetrate again and again.
Exploit VulnerabilitiesCommit the crime part of cybercrime. Steal private data, deny internal services, crash systems, and alter configurations.