The Lore Of Hijacking Systems, Part 3

The Attack Framework

Mi'kail Eli'yah
21 min readJul 20, 2021

The Attack Framework

In the information technology security world, hackers think in factors of 5 E’s: Endurance (or Effort), Expertise, Equipment (including Information, including a handle, such as a weakness or vulnerability, which can be used as an Exploit), Espionage (Inside job), and some Eventuality (Enriched Expectation, possible event, or something that may happen, “engineered luck” or “engineered emergence”, i.e. process of coming into being or realization or becoming exposed after being concealed, whether deliberate or random chance). — Ursa

If there is a conceptual duality in the word — “vigilance”, I would see it as “blind-spots”. I don’t think there is a perfect strategy, thence, a perfect defense cannot exist despite the most well-thought of security mechanisms. — 2006

Principles (and Stages) of Attack and Defense
1. Localize
2. Recognize
3. Forge and Feint
4. Affect, Effect, Infect
5. Commit / Omit (Include / Exclude): Covet attacks
6. Clean and clear
[Target]: Stage 1 and Stage 2
The attacker conducts Locate, Lock-down, and Lock-on the targets.
Stage 1 and 2 are sometimes termed as Reconnaissance, where intruder selects target, researches it, and attempts to identify vulnerabilities in the target network or system.[Sneak and Confuse]: Stage 3
The attacker then conducts Lure, and Lead (or mislead) on the mark.

--

--