Focus on IDS
Single Stage Attacks? May 17 2009 06:39AM
snort user (snort user gmail com)
Greetings All,

Typically, network based attacks have multiple stages.
(reconnaissance, infection, download rootkit, call home, further infection etc)

Some attacks may have a single stage (without reconnaissance) to
compromise a host.
However, even those attacks have a post-compromise stage, such as call home
or transfer/steal data or something else.
Otherwise, what's the motivation for compromising in the first place?

Can someone enlighten me if there are attacks that only have a single stage?
Examples or scenarios is much appreciated.


[ reply ]


Privacy Statement
Copyright 2010, SecurityFocus