From 23a0bc45ead38ab075645f9c9b130fc29246c974 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?A=E0=B8=A0l=E0=B9=8Fmiu=E0=B8=A0u=E0=BA=AE?= Date: Sat, 21 May 2022 15:22:16 +0300 Subject: [PATCH] Update README.md --- README.md | 44 +++++++++++++++++++++++--------------------- 1 file changed, 23 insertions(+), 21 deletions(-) diff --git a/README.md b/README.md index c61c66a..2b1d204 100644 --- a/README.md +++ b/README.md @@ -22,34 +22,36 @@ Diablo ~ Hacking / Pentesting Tools ┌──[ Anlominus 👽 Diablo $~] └──╼ -- Reconnaissance - - The observation stage: - - attackers typically assess the situation from the outside-in, in order to identify both targets and tactics for the attack. +--- -- Intrusion - - Based on what the attackers discovered in the reconnaissance phase, they’re able to get into your systems: - - often leveraging malware or security vulnerabilities. +# Reconnaissance +- The observation stage: + - attackers typically assess the situation from the outside-in, in order to identify both targets and tactics for the attack. -- Exploitation -The act of exploiting vulnerabilities, and delivering malicious code onto the system, in order to get a better foothold. +# Intrusion +- Based on what the attackers discovered in the reconnaissance phase, they’re able to get into your systems: + - often leveraging malware or security vulnerabilities. -- Privilege Escalation - - Attackers often need more privileges on a system to get access to more data and permissions: - - for this, they need to escalate their privileges often to an Admin. +# Exploitation +- The act of exploiting vulnerabilities, and delivering malicious code onto the system, in order to get a better foothold. -- Lateral Movement - - Once they’re in the system, attackers can move laterally to other systems and accounts in order to gain more leverage: - - whether that’s higher permissions, more data, or greater access to systems. +# Privilege Escalation +- Attackers often need more privileges on a system to get access to more data and permissions: + - for this, they need to escalate their privileges often to an Admin. -- Obfuscation / Anti-forensics - - In order to successfully pull off a cyberattack, attackers need to cover their tracks, and in this stage they often lay false trails, compromise data, and clear logs to confuse and/or slow down any forensics team. +# Lateral Movement +- Once they’re in the system, attackers can move laterally to other systems and accounts in order to gain more leverage: + - whether that’s higher permissions, more data, or greater access to systems. -- Denial of Service - - Disruption of normal access for users and systems, in order to stop the attack from being monitored, tracked, or blocked +# Obfuscation / Anti-forensics +- In order to successfully pull off a cyberattack, attackers need to cover their tracks, and in this stage they often lay false trails, compromise data, and clear logs to confuse and/or slow down any forensics team. -- Exfiltration - - The extraction stage: - - getting data out of the compromised system. +# Denial of Service +- Disruption of normal access for users and systems, in order to stop the attack from being monitored, tracked, or blocked + +# Exfiltration +- The extraction stage: + - getting data out of the compromised system. ---