1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nonamiya [84]
3 years ago
8

What phase of an attack implies a hacker is actively attacking a system and applications using vulnerabilities discovered in the

other phases?
Computers and Technology
1 answer:
Lilit [14]3 years ago
5 0

Answer:

Gaining Access Phase

Explanation:

Before the hacker gets to the maintaining access phase, two phases are already passed, these phases are:

<em>1. Reconnaissance</em> - Gathering all necessary information for the attack.

<em>2. Scanning</em> - using tools such as vulnerability scanners, network mappers, dialers among others to analyze the network using information gotten from the Reconnaissance phase.

Once the vulnerabilities of the system are discovered in the first two phases, the hacker is actively attacking the system in the third phase.

<em>3. Gaining Access</em> - At this phase, the hacker carries out the attack from the information retrieved from Phase 1 and 2. The system vulnerabilities already discovered are exploited efficiently to own the system. This can be carried out offline, through the internet, by having access to the host computer or through wired or wireless LAN.

Two phases come after the "gaining access" phase. They are:

<em> 4. Maintaining access</em> - At this phase, the hacker secures his access to the system from security personnel or other hackers. They ensure that backdoors are established to gain quick and easy access to the system for further attacks.

<em> 5. Covering Tracks</em> - log files are removed or modified by hackers to ensure that their actions are completely invisible to any suspecting person.

You might be interested in
I'm using assembly language. This is my assignment. I kinda confused about how to write code for this assignment. Can anyone exp
Brut [27]

Answer:

oid changeCase (char char_array[], int array_size ) {

__asm{

   mov eax, char_array;    

   mov edi, 0;

readArray:

   cmp edi, array_size;

   jge exit;

   mov ebx, edi;          

   shl ebx, 2;

   mov cl, [eax + ebx];    

check:

   //working on it

   cmp cl, 0x41;      

   jl next_indx;

   cmp cl, 0x7A;      

   jg next_indx;

   cmp cl, 'a';

   jl convert_down;

   jge convert_up;

convert_down:

   or cl, 0x20;        //make it lowercase

   jmp write;

convert_up:

   and cl, 0x20;      

   jmp write;

write:

   mov byte ptr [eax + ebx], cl    

next_indx:

   inc edi;

exit:

   cmp edi, array_size;

   jl readArray;

mov char_array, eax;

}

}

Explanation:

  • Move char_array to eax as it is base image .
  • Use ebx as offset .
  • Use ecx as the storage register .
  • check if cl is <= than ASCII value 65 (A) .
6 0
4 years ago
If you’re looking for a quick, high-level overview of common metrics such as audience growth, website traffic, and total posts,
salantis [7]

Google Analytics, this is a common one but there are others that do the same thing.

7 0
3 years ago
________ is a mobile broadband technology that relies on microwave transmissions to blanket large metropolitan areas from microw
FinnZ [79.3K]

Answer:

WiMax

Explanation:

Wimax is a family standards of a communication of bandwidth, this is a standard IEEE 802.16, was created to provide data velocity like 30 or 40 megabits per seconds, but in 2011 was updated, and now can provide 1 gigabit per second, the name WiMAX is for a forum created in 2001 to promote the standard.

4 0
3 years ago
Technician A says that Teflon sealing rings require special tools for proper installation. Technician B says that warming a Tefl
bezimeni [28]

Answer:Both Technicians A and B are correct.

Explanation:Teflon is a florinated polymer it is polytetrafluroethylene (PTFE). It is widely used in different fields and the making of materials for both home and industrial use. Teflon rings does requires special tools for proper installation which is called TEFLON RING INSTALLER.

Warming the a Teflon ring in water or oil at 130-140°F for about 5 minutes will help to soften the material for easier installation. cover wear ring grooves with plastic tape.

8 0
4 years ago
Am i in elementary yes no
IgorLugansk [536]

Answer:

no

Explanation:

7 0
3 years ago
Other questions:
  • Design a new Triangle class that extends the abstract
    13·1 answer
  • Write a script named numberlines.py. This script creates a program listing from a source program. This script should: Prompt the
    7·1 answer
  • What so the term used to describe how many bits are used in each pixel?
    7·1 answer
  • Which is not an example of a mobile operating system?
    9·1 answer
  • What is the meaning of the phrase the video has gone viral
    9·2 answers
  • Define the missing method. licenseNum is created as: (100000 * customID) licenseYear, where customID is a method parameter. Samp
    14·2 answers
  • Consider the following C program: int fun(int *i) { *i += 5; return 4; } 352 Chapter 7 Expressions and Assignment Statements voi
    11·1 answer
  • I need le help, darn ijourneys
    10·2 answers
  • Write a program num2rome.cpp that converts a positive integer into the Roman number system. The Roman number system has digits I
    8·1 answer
  • Im lonellly whos down to date me
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!