What Do Hackers Want?
As the preceding section mentioned, hackers approach their craft from a number of motivations. Their goals might differ, but they all have the goal of gaining power and control of a computer system or network. Many of their intermediate steps are therefore the same.
The computer attack and infiltration process is organized around the following steps:
1. | Get access to the system |
2. | Get privileges |
3. | Get comfortable |
4. | Get ready for the next attack |
These steps are discussed in upcoming sections. It is worth noting that, for coordinated and well-organized attacks on computer networks, a separate reconnaissance phase often precedes these steps. You'll learn some of these reconnaissance techniques in the section “Attacking a Network ...
Get Sams Teach Yourself TCP/IP in 24 Hours, Third Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.