1. Reconnaissance: A hmasa berin attack tur chu khawihah nge a awm tih an zawng phot a. Internet-ah hian Internet service provider-in min pek address hrang theuh kan nei a. Chutihrualin sumdawng te chuan address tam tak, internet domain pawh an nei thei bawk ang. Attack tur chuan site chu an scan- a, a host (port scan) te an hre bel hle a. Tichuan eng port nge expose a nih tih an hre thei nghal a. Heng bakah hian attacker te hian internet computer, a neitu hriatloha spam leh virus thehdarh tura an hman thin botnet (zombie army) te hi an lei a, chutiang hmang chuan mi an hack thin a ni. I hriat lohvin i computer pawh kha an lo hralhkual vak tawh mai thei!
2. Weaponization: A hming kan bel em em malware te hi an target system a zirin ralthuam hlauhawmah an chhuah zung zung mai a ni. Target computer panna beih nana design theih a ni a, a nih loh pawhin online backing website beih nan te an siam (customize) thei a ni. Tunlai khawvelah hi chuan inchhung lumah miin hacking hmanrua an siam vak vak tawh lo va, a thiam bik te siam an lei zel mai tawh a ni.
3. Delivery: Hacker te'n mi an beihna hmanrua ber chu document, image leh pdf te malware hmanga tihbawlhhlawha emaila thawn darh te (Hei hi Phising attack an ti), software lem hmanga malware thehdarh leh software thenkhat that tawk lohna remchanga hmanga malware thun te hi a ni. USB pendrive-a virus kan kai tam tak te hi hemi huanga mi hi an ni. A dang lehah chuan mi website malware hmanga infect a ni a. He step hi a tawi zawnga kan sawi dawn chuan Target computer-a ralthuam thiarna (dahna) a ni kan ti thei ang.
4. Exploitation: Victim host-ah ralthuam ber dah a nih tawh chuan, Exploitation code an run thei tawh a, hei hian a beih ber chu victim OS panna lai a ni. Tichuan victim OS-ah chuan an duh ang feature an dahbelh tawh mai a ni.
5. Installation: Victim OS-ah trojan leh backdoor online victim computer an khawih theihna tur an install thin a, hnathawh environment an insiam ti pawhin sawi ila a dik ang.
6. Command & Control: Attacker chuan a duh ang thala payload a dah theih chuan a hlauhawm tawh hle a, a duh chen chen command a run thei tawh tih a kawk ber a ni. Victim computer keyboard an nei tihna tluk a ni thei bawk ang.
7. Action: A chunga step paruk khi hlawhtling taka an kalpui theih chuan victim awmdan leh khawsak dan engkim lo ngaihthlak a, ruk theih ang ang ruk a, information an mamawh ang lakkhawm kha an hna pui ber chu a ni tawh mai. Pawisa ruk, Victim website tihmingchhiatsak, information
Attack hi a indawt danin a hlawhtling zel bik lo a, Mahse a step te te hian a thawh dan a sawilang chiang viau awm e. Hman remchan hunah Advanced Persistent Threats and Computer Forensic chungchang rawn share leh ang.
No comments :
Post a Comment