Focus on IDS
Back to list
Single Stage Attacks?
May 17 2009 06:39AM
snort user (snort user gmail com)
Typically, network based attacks have multiple stages.
(reconnaissance, infection, download rootkit, call home, further infection etc)
Some attacks may have a single stage (without reconnaissance) to
compromise a host.
However, even those attacks have a post-compromise stage, such as call home
or transfer/steal data or something else.
Otherwise, what's the motivation for compromising in the first place?
Can someone enlighten me if there are attacks that only have a single stage?
Examples or scenarios is much appreciated.
[ reply ]
Copyright 2010, SecurityFocus