What Do Hackers Want?

As the preceding section mentioned, hackers approach their craft from a number of motivations. Their goals might differ, but they all have the goal of gaining power and control of a computer system or network. Many of their intermediate steps are therefore the same.

The computer attack and infiltration process is organized around the following steps:

1.
Get access to the system
2.
Get privileges
3.
Get comfortable
4.
Get ready for the next attack

These steps are discussed in upcoming sections. It is worth noting that, for coordinated and well-organized attacks on computer networks, a separate reconnaissance phase often precedes these steps. You'll learn some of these reconnaissance techniques in the section “Attacking a Network ...

Get Sams Teach Yourself TCP/IP in 24 Hours, Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.