Chinese Hacker Methodology Flowchart

from IntelliBriefs:

The Dark Visitor blog

This Chinese hacker intrusion flowchart above, taken from Stuhack, clearly demonstrates Chinese hackers have developed a methodology to their attacks.
The first thing that popped into my head when I saw the chart was the Police song, “Murder by Numbers.”
Is this intrusion chart unique? Probably not. Could they have taken it from someone else? Sure.
As always, many thanks to Jumper for helping me to get the correct terminology. I really had some of them botched.


2 responses

  1. He himself never misses out reading the Libra Horoscope and the Weekly Horoscopes which are published in the newspaper.
    Hindi Newspaper is read by all and sundry in this vast
    country of ours. Sometimes, however you can tell that the story was used ‘as is’ from a press release provided by the White House or something like that’when a news article next to it has
    opposite ‘facts.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: