Phase 4 - Maintaining Access
*
Maintaining Access refers to the phase when the hacker tries to retain his 'ownership' of the system.
*
The hacker has exploited a vulnerability and can tamper and compromise the system.
*
Sometimes, hackers harden the system from other hackers as well (to own the system) by securing their exclusive access with Backdoors, RootKits, Trojans and Trojan horse Backdoors.
*
Hackers can upload, download or manipulate data / applications / configurations on the 'owned' system.
*
Maintaining Access refers to the phase when the hacker tries to retain his 'ownership' of the system.
*
The hacker has exploited a vulnerability and can tamper and compromise the system.
*
Sometimes, hackers harden the system from other hackers as well (to own the system) by securing their exclusive access with Backdoors, RootKits, Trojans and Trojan horse Backdoors.
*
Hackers can upload, download or manipulate data / applications / configurations on the 'owned' system.
Comments
Post a Comment