-
Maintaining Access refers to the phase when the hacker tries to retain his 'ownership' of the system.
-
The hacker has exploited a vulnerability and can tamper and compromise the system.
-
Sometimes, hackers harden the system from other hackers as well (to own the system) by securing their exclusive access with Backdoors, RootKits, Trojans and Trojan horse Backdoors.
-
Hackers can upload, download or manipulate data / applications / configurations on the 'owned' system.
Make Money Online & Earn Online Income @ RAM SURVEY
Add me as a friend on FACEBOOK: CLICK HERE to add me on FaceBook

Tuesday, March 31, 2009
Hacking Phase 4 - Maintaining Access
For more articles similar to this post visit @
Basics Hacking Tutorials
Subscribe to:
Post Comments (Atom)
0 Visitor Reactions & Comments:
Post a Comment