Update README.md

This commit is contained in:
Aภl๏miuภuຮ
2022-05-21 15:22:16 +03:00
parent 9684383fb9
commit 23a0bc45ea

View File

@@ -22,34 +22,36 @@ Diablo ~ Hacking / Pentesting Tools
┌──[ Anlominus 👽 Diablo $~]
└──╼
- Reconnaissance
- The observation stage:
- attackers typically assess the situation from the outside-in, in order to identify both targets and tactics for the attack.
---
- Intrusion
- Based on what the attackers discovered in the reconnaissance phase, theyre able to get into your systems:
- often leveraging malware or security vulnerabilities.
# Reconnaissance
- The observation stage:
- attackers typically assess the situation from the outside-in, in order to identify both targets and tactics for the attack.
- Exploitation
The act of exploiting vulnerabilities, and delivering malicious code onto the system, in order to get a better foothold.
# Intrusion
- Based on what the attackers discovered in the reconnaissance phase, theyre able to get into your systems:
- often leveraging malware or security vulnerabilities.
- Privilege Escalation
- Attackers often need more privileges on a system to get access to more data and permissions:
- for this, they need to escalate their privileges often to an Admin.
# Exploitation
- The act of exploiting vulnerabilities, and delivering malicious code onto the system, in order to get a better foothold.
- Lateral Movement
- Once theyre in the system, attackers can move laterally to other systems and accounts in order to gain more leverage:
- whether thats higher permissions, more data, or greater access to systems.
# Privilege Escalation
- Attackers often need more privileges on a system to get access to more data and permissions:
- for this, they need to escalate their privileges often to an Admin.
- Obfuscation / Anti-forensics
- In order to successfully pull off a cyberattack, attackers need to cover their tracks, and in this stage they often lay false trails, compromise data, and clear logs to confuse and/or slow down any forensics team.
# Lateral Movement
- Once theyre in the system, attackers can move laterally to other systems and accounts in order to gain more leverage:
- whether thats higher permissions, more data, or greater access to systems.
- Denial of Service
- Disruption of normal access for users and systems, in order to stop the attack from being monitored, tracked, or blocked
# Obfuscation / Anti-forensics
- In order to successfully pull off a cyberattack, attackers need to cover their tracks, and in this stage they often lay false trails, compromise data, and clear logs to confuse and/or slow down any forensics team.
- Exfiltration
- The extraction stage:
- getting data out of the compromised system.
# Denial of Service
- Disruption of normal access for users and systems, in order to stop the attack from being monitored, tracked, or blocked
# Exfiltration
- The extraction stage:
- getting data out of the compromised system.
---