NSA tiger teams follow a six-stage process when attempting to crack a target, he explained. These are reconnaissance, initial exploitation, establish persistence, install tools, move laterally, and then collect, exfiltrate and exploit the data.
During the reconnaissance phase agents examine a network electronically and, in some cases, physically. They work out who the key personnel are, what email accounts matter, how far the network extends, and maintain constant surveillance until they can find a way in.
January 28, 2016
NSA’s top hacking boss explains how to protect your network from his attack squads
[Via Bruce Schneier. See also NSA Hacker Chief Explains How to Keep Him Out of Your System.
Most of this process applies to physical as well as information security. Use this information wisely.—Joe]