| Reconnaissance |
Gathering information about an organization. Includes system hardware info, network configurations, and individual user information. |
| Social Engineering |
Manipulating others into providing sensitive information, including using intimidation and sympathy. |
| Technical Approaches |
Port scanning or ping sweeping. |
| System Breaching |
Penetrating the system defenses, using the information gathered during reconnaissance. |
| Escalate Privileges |
Give yourself admin permissions once you've penetrated the network. |
| Create a Backdoor |
Leave a way for you to penetrate the system once you're in. |
| Stage Computers |
Add additional software in neighbor systems that enable you to penetrate again and again. |
| Exploit Vulnerabilities |
Commit the crime part of cybercrime. Steal private data, deny internal services, crash systems, and alter configurations. |