List Phases of a Computer Attack

711 Words3 Pages
Unit 9 Assignment 1: List Phases of a Computer Attack There are 4 or 5 phases of a computer attack, depending on how you look at them, and they are reconnaissance, probing or scanning, gaining access, maintaining access, and preventing detection. Depending on how you look at the phases probing or scanning can be placed in the same phase as reconnaissance. During each phase of a computer attack the attacker has a purpose or reason for what he/she is doing and they could range from placing malicious code onto a network or scanning a network to see which ports are open and may have someone listening to it on the network end. There are many reasons that a particular person or company is targeted for an attack and couple of those are that the attacker is being paid to do so or that person or company did something to the attacker that the attacker feels he needs to punish them for. Reconnaissance is one of the phases of a computer attack and is the safest and the easiest to accomplish. In this phase an attacker would be using various tools and applications that allows them to see which ports are open on a network or computer and what applications are listening in on the other end of the router or firewall. Some of the various tools that an attacker will use during the reconnaissance phase are: • DNS and ICMP tools within the TCP/IP protocol suite • Standard and customized SNMP tools • Port scanners and port mappers • Security probes (Introduction to Information Systems Security, 367) The attacker can use other internet related websites and such to find more information out on their target such as DNS Lookup or WHOIS Lookup. These will both give more information about the target's DNS server name. The attack will also use rpcinfo or telnet logon in order to find out if rpc is active for remote command execution and to find out how soft the perimeter

More about List Phases of a Computer Attack

Open Document