IDS mailing list archives
Single Stage Attacks?
From: snort user <snort.user () gmail com>
Date: Sun, 17 May 2009 02:39:20 -0400
Greetings All, Typically, network based attacks have multiple stages. (reconnaissance, infection, download rootkit, call home, further infection etc) Some attacks may have a single stage (without reconnaissance) to compromise a host. However, even those attacks have a post-compromise stage, such as call home or transfer/steal data or something else. Otherwise, what's the motivation for compromising in the first place? Can someone enlighten me if there are attacks that only have a single stage? Examples or scenarios is much appreciated. Thanks
Current thread:
- Single Stage Attacks? snort user (May 19)
- Re: Single Stage Attacks? Jamie Riden (May 19)
- Re: Single Stage Attacks? dreamwvr (May 20)
- Re: Single Stage Attacks? Stuart Staniford (May 20)