There are some common steps used by industry and most commons in Cyber field are listed below.
HACKING Methodology (Steps)
Footprinting (whois,nslookup) »
Scanning (Nmap,fping) »
Enumeration (dumpACL, showmount, Iegion, rpcinfo »
Gaining Access(Tcpdump) »
Escalating Privilege(John the ripper, getadmin) »
Pilfering (Rhosts. userdata, configtile. registry) »
Covering Tracks (zap, rootkits) »
Creating Backdoors (corn, at, startup folder, keylogger, rdp) »
Denial Of Service (synk4, ping Of death).
MITRE ATT&CK:
Reconnaissance»
Resource Development »
Initial Access» Execution »
Persistence »
Privilege Escalation »
Defense Evasion»
Credential Access »
Discovery »
Lateral Movement »
Collection »
Command and Control »
Exfiltration»
Impact.
CYBER KILL CHAN:
Reconnaissance»
Weaponization»
Delivery »
Exploitation »
Installation »
Command and Control »
Action and Objective .
Incident Response:
Identify » Protect » Detect » Respond» Recover.
SANS Incident Response:
Preparation » Identification» Containment » Eradication » Recovery » Lesson Learned
0 comments:
Post a Comment