DB's, logs, cards, accs, crypto....
& etc
Inj. a backdoor 2the system
for the possibility of return
[ 05 ]
PRIVILLEGE ESCALATION
Achieving privilege escalation on the attacked system
[ 04 ]
GETTING ACCESS
&& EXPLOITING
Testing adjustments, attack and exploitation...
Research arch and study of results, correcting the PLAN X
[ 02 ]
OBSERVE
&&
SCANNING
Analyze behavior:
network, web, traffic, actions, logs
and data flow
[ 01 ]
OSINT
–> information gathering
Explore the system architecture of target