O'Reilly logo

HIGH-TECH CRIMES REVEALED: CYBERWAR STORIES FROM THE DIGITAL FRONT by Steven Branigan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

The Seven Steps of Hacking

Hackers like proven methods of success, just like the rest of us! The best hackers generally follow seven steps as part of their attacking strategy, which are

1.
Pick a target to attack, such as a credit card database if the hacker wants money, or perhaps a high profile web server if he wants to impress others.
2.
Find the computers of the target that are accessible via the Internet or computer modem.
3.
Discover vulnerable computer systems that potentially contain what is being sought. This is very similar to the old-world criminals that might want to steal diamonds, so they check jewelry stores for unlocked doors.
4.
Break into the computer system, which can be very easy with the right hacking tools.
5.
Once in, elevate ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required