Hacking Phase 4 - Maintaining Access

Phase 4 - Maintaining Access

*

Maintaining Access refers to the phase when the hacker tries to retain his 'ownership' of the system.
*

The hacker has exploited a vulnerability and can tamper and compromise the system.
*

Sometimes, hackers harden the system from other hackers as well (to own the system) by securing their exclusive access with Backdoors, RootKits, Trojans and Trojan horse Backdoors.
*

Hackers can upload, download or manipulate data / applications / configurations on the 'owned' system.

Comments