Genetic Shackles of Intrusion: Put to an End

gathered using different tools and techniques to build a surface for a strong and robust attack against target [4]. Manipulation After scouting and invasion of the target system the attacker can easily manipulate the system as required to explore further. The attacker will use multiple tools for gathering information and weaknesses of the system and the network its connected to and deliver malicious programs or executable set of processes to imprint its strong foothold. Once the target machine is accessed by the attacker. The very dire need is now to control the target completely and that only can be done with the master account. The attacker will use different ways with own 3 party or own developed apparatuses to escalate AbsTRACT Genetic Shackles of Intrusion: Put to an . Biomed J Sci & Tech Res 29(1)-2020. Today we all live and work in a partaking information superhighway. Almost every type of Machines, the Interconnecting communication networks, and the services available over the networks make up this cyberspace highway. As cyberspace conquers almost all areas of modern day existing, playing, and working, it is becoming more momentous that we recognize its technical nitty-gritties, threads and procedures, as well as its aptitudes, threats, and feebleness. This paper explores different kind of Intrusions threats and detection that are and can be used for and against target.


Introduction
The process of Intrusion is to find weaknesses and possible ways to break the security of any system, machine or communication network system or causing it to enter into an uncertain state. The act of intruding or acquisition unlawful access to a system typically leaves hints that can be revealed by Intrusion Detection Systems.
We all live in the same neighborhood and within that neighborhood there are is one attacker beside each one of us, this result in never ending game of cat and mouse either it's home public or a workplace.
There is abundance of research available on internet about the intrusion and its detection with different perspective from analysis of classification to traffic analysis and mining of information data. Apparently, a very little information has been published on a precise method of how this data is being manipulated and gathered in the network [1].
Today's world is all about ones and zeros a binary notation of any information, where any information is available in various forms and is ready to be used in any way, with the bit of luck and privilege. The very step of forming a strong attack on any target is scouting or it can be called reconnaissance. The attackers are very well equipped with unique skill sets and they not only walk into targets doorsteps and will gather all the possible information and will leave no traces that leads back to them [2]. The process of the cyber shackles is a combination of series of process which are discussed.

Scouting
The process of scouting, revolve around one simple idea "Information Gathering". By using different tool sets, techniques or methods for important information gathering and use for building a robust attack against the target. Reconnaissance has two main vectors: active and passive [3].

Invasion
On the bases of target scouting all the prior information is gathered using different tools and techniques to build a surface for a strong and robust attack against target [4].

Manipulation
After scouting and invasion of the target system the attacker can easily manipulate the system as required to explore further.
The attacker will use multiple tools for gathering information and weaknesses of the system and the network its connected to and deliver malicious programs or executable set of processes to imprint its strong foothold.

Privilege Escalation
Once the target machine is accessed by the attacker. The very dire need is now to control the target completely and that only can be done with the master account. The attacker will use different ways with own 3 rd party or own developed apparatuses to escalate

Exfiltration
The extraction stage is basically exporting information of target.
Once the attacker gets required information: they'll will move to further step ahead and get that information out to a meticulous location, where they will use that information according to what suited them best or let's say serve them best in terms of financially, politically, socially or even they will use it as bribery to get closer their other targets. There is no ETA or time to get such information out of any target, it depends on one skills and target ( Figure 1).

Conclusion
This paper outlines the stages and life cycle of computer systems or network intrusion. This paper further explains how each of the stage supports and provide information to gain stronger foothold on target machine. For any successful intrusion into any target, single tool may not give us all the required information for a successful cyber intrusion attack. Therefore, a combination of tools with methodologies and techniques are required to be incorporated together to get all the required information.