mirror of
https://github.com/AnLoMinus/Diablo.git
synced 2026-02-12 14:02:47 +00:00
Update README.md
This commit is contained in:
37
README.md
37
README.md
@@ -5,7 +5,7 @@ Diablo ~ Hacking / Pentesting Tools
|
||||
|
||||
<img width="822" alt="image" src="https://user-images.githubusercontent.com/51442719/169499979-01bff027-ed81-47f9-9663-2ba13a21b2fe.png">
|
||||
|
||||
|
||||
|
||||
</div>
|
||||
|
||||
# 📜 Menu
|
||||
@@ -22,6 +22,34 @@ Diablo ~ Hacking / Pentesting Tools
|
||||
┌──[ Anlominus 👽 Diablo $~]
|
||||
└──╼
|
||||
|
||||
- Reconnaissance
|
||||
- The observation stage:
|
||||
- attackers typically assess the situation from the outside-in, in order to identify both targets and tactics for the attack.
|
||||
|
||||
- Intrusion
|
||||
- Based on what the attackers discovered in the reconnaissance phase, they’re able to get into your systems:
|
||||
- often leveraging malware or security vulnerabilities.
|
||||
|
||||
- Exploitation
|
||||
The act of exploiting vulnerabilities, and delivering malicious code onto the system, in order to get a better foothold.
|
||||
|
||||
- Privilege Escalation
|
||||
- Attackers often need more privileges on a system to get access to more data and permissions:
|
||||
- for this, they need to escalate their privileges often to an Admin.
|
||||
|
||||
- Lateral Movement
|
||||
- Once they’re in the system, attackers can move laterally to other systems and accounts in order to gain more leverage:
|
||||
- whether that’s higher permissions, more data, or greater access to systems.
|
||||
|
||||
- Obfuscation / Anti-forensics
|
||||
- In order to successfully pull off a cyberattack, attackers need to cover their tracks, and in this stage they often lay false trails, compromise data, and clear logs to confuse and/or slow down any forensics team.
|
||||
|
||||
- Denial of Service
|
||||
- Disruption of normal access for users and systems, in order to stop the attack from being monitored, tracked, or blocked
|
||||
|
||||
- Exfiltration
|
||||
- The extraction stage:
|
||||
- getting data out of the compromised system.
|
||||
|
||||
---
|
||||
|
||||
@@ -29,7 +57,7 @@ Diablo ~ Hacking / Pentesting Tools
|
||||
<summary align="center">
|
||||
<h4> Sources </h4>
|
||||
</summary>
|
||||
|
||||
|
||||
- Inspirational tools
|
||||
- as Anonymity Surfing
|
||||
- pl Planning
|
||||
@@ -49,7 +77,6 @@ Diablo ~ Hacking / Pentesting Tools
|
||||
|
||||
- Cheat Sheets:
|
||||
- [CheatSheets](https://github.com/Anlominus/CheatSheets)
|
||||
|
||||
|
||||
|
||||
|
||||
</details>
|
||||
|
||||
|
||||
Reference in New Issue
Block a user