Step 7: control

Once the attacker gains access to the network or creates administrator accounts or installs all the necessary tools for backdoor entry any time to the system, the attacker is in control of the target.

Step 8: action on set goals

With total control on the target system, the attacker can set goals and achieve it with or without the knowledge of the genuine user.

The attacks are thus classified depending on the various steps taken by the hacker in the process of the attack, starting from hiding the identity to information collection, which is the pre-phase of an attack, to the actual attack.
