Nov 13 2008

Chinese hacker attack flowchart

Published by at 7:30 pm under Hacking for money,Other attacks


Double-Click to Fully Enlarge

This Chinese hacker intrusion flowchart above, taken from Stuhack, clearly demonstrates Chinese hackers have developed a methodology to their attacks.

The first thing that popped into my head when I saw the chart was the Police song, “Murder by Numbers.”

Is this intrusion chart unique? Probably not. Could they have taken it from someone else? Sure.

As always, many thanks to Jumper for helping me to get the correct terminology. I really had some of them botched.

4 responses so far

4 Responses to “Chinese hacker attack flowchart”

  1. CBRP1R8on 14 Nov 2008 at 7:52 am

    Oh nice one, this almost mirrors a diagram I had from my ethical hacker IBM course. :D

  2. Heikeon 14 Nov 2008 at 9:18 am

    Yeah, the Chinese seem to be very talented at retro-engineering darn near anything. I guess that includes intrusion charts. ;)

  3. [...] The Dark Visitor >> Chinese hacker attack flowchart As has been mentioned in other arenas, the online criminal community is no longer just a bunch of script kiddies. They are organized, focused and have good processes. This flowchart is a good example. [...]

  4. Friday Summary - 10-21-08 | securosis.comon 21 Nov 2008 at 10:31 am

    [...] Chinese Hacker Flowchart. Nothing new, but interesting [...]