The Dark Visitor blog
This Chinese hacker intrusion flowchart above, taken from Stuhack, clearly demonstrates Chinese hackers have developed a methodology to their attacks.
The first thing that popped into my head when I saw the chart was the Police song, “Murder by Numbers.”
Is this intrusion chart unique? Probably not. Could they have taken it from someone else? Sure.
As always, many thanks to Jumper for helping me to get the correct terminology. I really had some of them botched.