Learning The Attacks

 

Discovering the world of exploitation caught my eye of interest wondering how it works and how it applies to the different devices. I have experienced phishing attacks then fall for it twice this is also known as hotmail attacks that produces links to everyone with a deceiving caption and then after the click of the link you're account is now compromised. My account got hacked late night and it was coming from Hong Kong but I knew something is different because they use proxy servers or vpn that covers up their location and it would display random nations and places so I quit tracking the hacker and went on important matters. Due to my lack of blogging, The college demands attention for the major subjects and minor subjects fulfillment that means all my personal and my security projects came to halt. Prioritize your time is the key. Anyways, Cyber attacks are silent attacks because attacker steals data without your consent so thats why we have to raise an alarm and build a defenses such as anti-virus software and let system update patch itself. Letting an operating software update itself boosts security on your device because it patches the vulnerables that the attacker wants to exploit it.

I'm in the middle of the learning curve while schooling delaying my self study sufficiency because of the college demands so I've decided to finish school first then self study so I can focus more on my roadmap to cybersecurity. So bear with me as I am trying to absorb meaningful tech skills while finishing college.

Learning how to hack is a permissive action because when you are setting up an attack you will need a permission to hack someone ethically but if your target device is owned by you, you wont need any permissions.

In the first step, you need to setup a cloaking tool or device because it helps to cover your tracks as you are initiating an attack. Then you will need to scan the target for locating its vulnerability. If it is found, initiate an exploitation to extract or to enter the system. After that, hackers like to setup backdoors to the target device so they can come back and scan for more. Escalation of privileges is important because it will leverage you as admin. and lastly deliver a malicious payload to infect the system under your control.

I know it's not the attacks but it is how of the attack.

 

Comments

Popular Posts