Capture

Capture Attackers access unprotected systems and capture sensitive information from those systems that have proven vulnerable to compromise. They may also install malware to secretly acquire data or disrupt operations



The attacker has identified the location of high value assets
They then work to gain access to systems they have breached so they can steal this information
The attacker sets up an external drop server
Then they copy the desired data to a temporary on-premise staging server
Discovery

Discovery With access to the network, attackers stay low and slow to avoid detection. They then map the organizations defenses from the inside and create a battle plan for information they intend to target



A Command-and-Control server is now set up
Data is trawled and the malware contacts the attacker via Command-and-Control channels
The attacker collates stolen data using malware to transmit logins and passwords as users access key servers
The attacker leverages stolen data, passwords and logins to map the network, access other systems and identify high value assets
Reconnaissance

Reconnaissance Attackers leverage information from a variety of factors to understand their target including identifying vulnerable servers, insecure applications, or unpatched systems that can be compromised



The attacker probes networks and systems to identify weaknesses, making every effort to remain undetected
The attacker also researches employees to target through publicly available sources
The attacker attempts to compromise them with spam or a phishing attack
Research may also identify frequented websites that can be baited with malware
Ethical Hacking

An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit. To test a security system, ethical hackers use the same methods as their less principled counterparts, but report problems instead of taking advantage of them. Ethical hacking is also known as penetration testing, intrusion testing and red teaming.




In order for hacking to be deemed ethical, the hacker must obey the below rules.

1. You have permission to probe the network and attempt to identify potential security risks. It is recommended that if you are the person performing the tests that you get written consent.
2. You respect the individual's or company's privacy and only go looking for security issues.
3. You report all security vulnerabilities you detect to the company, not leaving anything open for you or someone else to come in at a later time.
4. You let the software developer or hardware manufacturer know of any security vulnerabilities you locate in their software or hardware if not already known by the company.