- 36
- 0
- 29 Сен 2023
This short piece of writing is geared towards targeted attacks (spear phishing to be exact) and the shedding of some light on the thought process of a grey hat. In regards to Cyber Security methodologies concerning information gathering and reconnaissance, the script kiddie or threat actor learns about the steps taken in conducting a penetration test and decides to use it for his/her malicious purposes. The actor writes (codes) a PHP script for OS detection of the target's OS, goes in search of already written scripts or decides to use Nmap (The script kiddie's intuition ) to acquire the OS versions of the target and open ports, and then downloads the the OS and runs it on his VMWare to conduct his/her pentesting activities with his/her malicious intents, using his/her malware-as-a-service acquired product (keylogger, stealer, bot), while getting ready for execution in the wild on his/her targeted victim.
NB: This piece of writing was written to shed some light on what might be going on in the thought process of a threat actor and is in no way written to encourage or promote malicious activities, I take no responsibility for what you use it for and can sue for up to 1M$ per person on usage (given the consideration of what damages the idea could cause if used for malicious purpose). It is meant for educational purposes only.
NB: This piece of writing was written to shed some light on what might be going on in the thought process of a threat actor and is in no way written to encourage or promote malicious activities, I take no responsibility for what you use it for and can sue for up to 1M$ per person on usage (given the consideration of what damages the idea could cause if used for malicious purpose). It is meant for educational purposes only.