Hacking/Attack

A is a hidden unauthorized access or use of information system.

One of most simple attacks is. Notorious kind of attack is. Common method to make some money by hacking is. is an example of expensive attack. Authorized simulation of cyberattack is called.

Preparation
As as permission for. Follow ethical hacking. Then anticipate possible problems. Prepare what needed before it is too late. s probably start with setting up anonymous communication with.

Tools:
 * https://docs.rapid7.com/metasploit/installing-metasploit-pro
 * https://www.offensive-security.com/metasploit-unleashed/metasploit-fundamentals/

Reconnaissance
See Reconnaissance

Creative
Develop exploits.

Aggressive
See Penetration

The unified kill chain

 * 1. Reconnaissance - Researching, identifying and selecting targets using active or passive reconnaissance.
 * 2. Weaponization - Preparatory activities aimed at setting up the infrastructure required for the attack.
 * 3. Delivery - Techniques resulting in the transmission of a weaponized object to the targeted environment.
 * 4. - Techniques aimed at the manipulation of people to perform unsafe actions.
 * 5. - Techniques to exploit vulnerabilities in systems that may, amongst others, result in code execution.
 * 6. Persistence - Any access, action or change to a system that gives an attacker persistent presence on the system.
 * 7. - Techniques an attacker may specifically use for evading detection or avoiding other defenses.
 * 8. Command & control - Techniques that allow attackers to communicate with controlled systems within a target network.
 * 9. - Tunneling traffic through a controlled system to other systems that are not directly accessible.
 * 10. - Techniques that allow an attacker to gain knowledge about a system and its network environment.
 * 11. - The result of techniques that provide an attacker with higher permissions on a system or network.
 * 12. Execution - Techniques that result in execution of attacker-controlled code on a local or remote system.
 * 13. Credential access - Techniques resulting in the access of, or control over, system, service or domain credentials.
 * 14. Lateral movement - Techniques that enable an adversary to horizontally access and control other remote systems.
 * 15. Collection - Techniques used to identify and gather data from a target network prior to exfiltration.
 * 16. Exfiltration - Techniques that result or aid in an attacker removing data from a target network.
 * 17. Impact - Techniques aimed at manipulating, interrupting or destroying the target system or data.
 * 18. Objectives - Socio-technical objectives of an attack that are intended to achieve a strategic goal.