Web attack: 5 steps

The term "Web attack" is used by security professionals to describe intrusions made through Web technologies, which may result in total or partial breach of target systems.cyber attack Web Attack

For all attacks, perpetrators usually perform the same five steps: identifying, scanning, accessing, maintaining access, and covering the violation.

At its stage recognition, attackers typically take one of the following two approaches. They can either keep a low profile while collecting data that will help them later, or they are actively interested in her from potential targets leaving traces everywhere, which can be removed later in the event of a successful breach.

Η scan is the second step and not only refers to scanning for details and about the target, but for vulnerability scanning. At this point, the attacker has already selected his target, and is looking for errors in the defense, using tools such as port scanners, network mappers, and sweepers.

The third stage is when the attackers get it access in the target system, using aggressive hacking techniques such as cross-site scripting, session hijacking, DoS attacks, buffer overflows, SQL injections, and more.

After gaining access to the targeted systems, in the next stage, attackers install tools such as , backdoors, or rootkits (bootkits), to keep access to infected systems until they have all the data.

The last step is when all the data is stolen, and the attackers try to hide traces their.

The only thing left for the attackers is to change or delete the infected system's logs to remove any traces they left behind during the previous stages.

The following infographic (Anatomy of a Web Attack) describes in detail all these stages and has been created by security Barricade.

Click to enlarge Web Attack

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.100 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).