Home » Hacking Phases » Hacking Phase 4 - Maintaining Access
Hacking Phase 4 - Maintaining Access
Phase 4 - Maintaining Access
*
Maintaining Access refers to the phase when the hacker tries to retain his 'ownership' of the system.
*
The hacker has exploited a vulnerability and can tamper and compromise the system.
*
Sometimes, hackers harden the system from other hackers as well (to own the system) by securing their exclusive access with Backdoors, RootKits, Trojans and Trojan horse Backdoors.
*
Hackers can upload, download or manipulate data / applications / configurations on the 'owned' system.
Tags: Hacking Phases

This post was written by:
Adnan Anjum - who has written 1000+ posts on hackguide4u.
Adnan Anjum is a professional Geek. Follow him on Twitter or email him
Subscribe to:
Post Comments (Atom)
Share your views...
0 Respones to "Hacking Phase 4 - Maintaining Access"
Post a Comment