¤Reconnaissance
•Active / passive
¤Scanning
¤Gaining access
•Operating system level / application level
•Network level
•Denial of service
¤Maintaining access
•Uploading / altering / downloading programs or data
Covering tracks
No comments:
Post a Comment
IF YOU LIKE THE MATTER DO LEAVE A VOTE OF THANKS. ALSO LEAVE YOUR VALUABLE SUGGESTIONS . INDIVIDUAL PROBLEMS WILL ALSO BE ADDRESSED.