Aภl๏miuภuຮ 793f4047c0 Update README.md
2022-05-21 19:40:15 +03:00
2022-05-20 21:00:00 +03:00
2022-05-21 09:39:33 +03:00
2022-05-21 19:39:55 +03:00
2022-05-21 11:56:34 +03:00
2022-05-21 19:40:15 +03:00

Diablo

Diablo ~ Hacking / Pentesting Tools

image

📜 Menu / To Do

  • [1] - Anonymity Surfing
  • [2] - Planning and Scoping
  • [3] - Reconnaissance & Vulnerability Assessment
  • [4] - Gaining Access & Maintaining Access
  • [5] - Covering tracks
  • [6] - Analysis & Reporting

┌──[ Anlominus 👽 Diablo $~]
└──╼


1) Steps Example

Reconnaissance

  • The observation stage:
    • attackers typically assess the situation from the outside-in, in order to identify both targets and tactics for the attack.

Intrusion

  • Based on what the attackers discovered in the reconnaissance phase, theyre able to get into your systems:
    • often leveraging malware or security vulnerabilities.

Exploitation

  • The act of exploiting vulnerabilities, and delivering malicious code onto the system, in order to get a better foothold.

Privilege Escalation

  • Attackers often need more privileges on a system to get access to more data and permissions:
    • for this, they need to escalate their privileges often to an Admin.

Lateral Movement

  • Once theyre in the system, attackers can move laterally to other systems and accounts in order to gain more leverage:
    • whether thats higher permissions, more data, or greater access to systems.

Obfuscation / Anti-forensics

  • In order to successfully pull off a cyberattack, attackers need to cover their tracks, and in this stage they often lay false trails, compromise data, and clear logs to confuse and/or slow down any forensics team.

Denial of Service

  • Disruption of normal access for users and systems, in order to stop the attack from being monitored, tracked, or blocked

Exfiltration

  • The extraction stage:
    • getting data out of the compromised system.

Sources

  • Inspirational tools
Languages
HTML 80.5%
Shell 19.5%