Recipe for an Attack

  1. Reconnaissance: look for vulnerabilities
  2. Gain access to the system through vulnerability
  3. Escalate access to gain more advanced privileges
  4. With advanced privileges, tunnel through network looking for additional systems to access
  5. Install tools on compromised systems to gain deeper network access
  6. Install a backdoor to allow long-term access even if the initial vulnerability is corrected
  7. Continue to probe until find ultimate target