Abtrusion Security Click here to send someone a link to this page Click here to Bookmark this page
home   products   buy   download   support   about   news   links   contact

Abtrusion Security home

Security products

Purchase Abtrusion Protector

Download of security software for Windows

Abtrusion Protector support

About Abtrusion Security

Security related news

Security links


Download Abtrusion Protector


Information for

> Corporate Management

> System Administrators

> Security Professionals

> Software Developers

> Home Users

Anatomy of a Hacker Attack

by Torbjörn Hovmark, president of Abtrusion Security AB

A hacker attack typically includes a couple of phases.
  1. Collect information about the target of the attack
  2. Locate a weakness to be used as an entry point
  3. Download and execute software on the target
  4. Use security holes to elevate privileges
  5. Steal or modify information
  6. Cover the tracks


Single-page view

                         Next >>

Copyright © 2002 Abtrusion Security AB. All rights reserved. This document may be reproduced provided that it is reproduced in its entirety and that this copyright message is retained.