mirror of
https://github.com/AnLoMinus/Diablo.git
synced 2026-02-12 14:02:47 +00:00
Update README.md
This commit is contained in:
38
README.md
38
README.md
@@ -38,44 +38,6 @@ Diablo ~ Hacking / Pentesting & Reporting
|
||||
- [x] whois
|
||||
- [x] dirb
|
||||
|
||||
---
|
||||
|
||||
<details>
|
||||
<summary>
|
||||
1) Steps Example
|
||||
</summary>
|
||||
|
||||
# Reconnaissance
|
||||
- The observation stage:
|
||||
- attackers typically assess the situation from the outside-in, in order to identify both targets and tactics for the attack.
|
||||
|
||||
# Intrusion
|
||||
- Based on what the attackers discovered in the reconnaissance phase, they’re able to get into your systems:
|
||||
- often leveraging malware or security vulnerabilities.
|
||||
|
||||
# Exploitation
|
||||
- The act of exploiting vulnerabilities, and delivering malicious code onto the system, in order to get a better foothold.
|
||||
|
||||
# Privilege Escalation
|
||||
- Attackers often need more privileges on a system to get access to more data and permissions:
|
||||
- for this, they need to escalate their privileges often to an Admin.
|
||||
|
||||
# Lateral Movement
|
||||
- Once they’re in the system, attackers can move laterally to other systems and accounts in order to gain more leverage:
|
||||
- whether that’s higher permissions, more data, or greater access to systems.
|
||||
|
||||
# Obfuscation / Anti-forensics
|
||||
- In order to successfully pull off a cyberattack, attackers need to cover their tracks, and in this stage they often lay false trails, compromise data, and clear logs to confuse and/or slow down any forensics team.
|
||||
|
||||
# Denial of Service
|
||||
- Disruption of normal access for users and systems, in order to stop the attack from being monitored, tracked, or blocked
|
||||
|
||||
# Exfiltration
|
||||
- The extraction stage:
|
||||
- getting data out of the compromised system.
|
||||
|
||||
</details>
|
||||
|
||||
|
||||
---
|
||||
|
||||
|
||||
Reference in New Issue
Block a user