mirror of
https://github.com/AnLoMinus/Diablo.git
synced 2026-02-12 14:02:47 +00:00
9684383fb928abbf13835af2a408f053e62dbd91
📜 Menu
- as Anonymity Surfing
- pl Planning
- sv Scanning Vulnerability
- ga Gaining Access
- ma Maintaining Access
- ct Covering tracks
- an Analysis
- rp Reporting
┌──[ Anlominus 👽 Diablo $~]
└──╼
-
Reconnaissance
- The observation stage:
- attackers typically assess the situation from the outside-in, in order to identify both targets and tactics for the attack.
- The observation stage:
-
Intrusion
- Based on what the attackers discovered in the reconnaissance phase, they’re able to get into your systems:
- often leveraging malware or security vulnerabilities.
- Based on what the attackers discovered in the reconnaissance phase, they’re able to get into your systems:
-
Exploitation The act of exploiting vulnerabilities, and delivering malicious code onto the system, in order to get a better foothold.
-
Privilege Escalation
- Attackers often need more privileges on a system to get access to more data and permissions:
- for this, they need to escalate their privileges often to an Admin.
- Attackers often need more privileges on a system to get access to more data and permissions:
-
Lateral Movement
- Once they’re in the system, attackers can move laterally to other systems and accounts in order to gain more leverage:
- whether that’s higher permissions, more data, or greater access to systems.
- Once they’re in the system, attackers can move laterally to other systems and accounts in order to gain more leverage:
-
Obfuscation / Anti-forensics
- In order to successfully pull off a cyberattack, attackers need to cover their tracks, and in this stage they often lay false trails, compromise data, and clear logs to confuse and/or slow down any forensics team.
-
Denial of Service
- Disruption of normal access for users and systems, in order to stop the attack from being monitored, tracked, or blocked
-
Exfiltration
- The extraction stage:
- getting data out of the compromised system.
- The extraction stage:
Sources
- Inspirational tools
-
as Anonymity Surfing
-
pl Planning
-
sv Scanning Vulnerability
-
ga Gaining Access
-
ma Maintaining Access
-
ct Covering tracks
-
an Analysis
-
rp Reporting
-
Tools:
-
Cheat Sheets:
-
Languages
HTML
80.5%
Shell
19.5%
