Hackers and Crimes
Hackers and Crimes
Hackers and Crimes
CYBER CRIMES
TYPES OF HACKERS
2 4 6
1 3 5 7
RECONNAISSANCE DELIVERY INSTALLATION ACTION ON OBJECTIVES
The cyber kill chain is a framework used in
cybersecurity to understand and analyze the
stages of a cyberattack, from the initial
reconnaissance to the final objective of the
attacker. It was developed by defense contractor
Lockheed Martin and is often used to improve an
organization's defense strategy by identifying and
mitigating threats at each stage of the attack
lifecycle.
RECONNAISSANCE
Objective: In this initial phase, the attacker gathers
information about the target, including potential
vulnerabilities, systems, and individuals.
Methods: Attackers may use open-source
intelligence, social engineering, or passive
scanning to identify potential targets and
weaknesses.
Example: Scanning public websites and social
media for information about the target
organization's employees or systems.
WEBSITE REGISTRATION
DETAILS
• WHOIS.COM
• URLSCAN.IO
ORGANISATION DETAILS
Social Engineering: Social engineering techniques, such as phishing emails, can trick
users into revealing login credentials or other sensitive information. Attackers may also
use pretexting, baiting, or tailgating to gain physical access to a target's premises.
Credential Theft: Attackers may acquire valid login credentials through various means,
such as password cracking, credential stuffing (using previously stolen usernames and
passwords), or keylogging.