My Image

7 Steps of Hacking

The routine (more commonly known as 7 Steps of Hacking) of an infiltration can generally be broken down as follows:

  1. Information discovery - Attackers find as much information as possible on their target.
  2. Target scanning - Different points of attack are identified.
  3. Vulnerability assessment - The easiest point of attack is selected.
  4. Exploiting the weakness - The attacker gains access to the network.
  5. Privilege escalation - The intruder gains greater access by escalates their privileges.
  6. Retaining access - This allows the attacker to gain access at any time in the future.
  7. Covering tracks - Finally, any sign the system has been exploited must be concealed.


Steve Mac Media Limited - 7592963
Trading Address: Marne House, 24 Mount Ephraim Road, Tunbridge Wells, Kent TN1 1ED
Registered Office: 90-92 King Street, Maidstone, Kent, ME14 1BH