Phases of Hacking | Ethical Hacking

PHASES OF HACKING

  • Reconnaissance
  • Scanning 
  • Gaining Access
  • Mantaining Access
  • Clearing Tracks
RECONNAISSANCE -

Is the first step of hacking. Also called as footprinting and Information gathering phase where we collect as much as information as possible about the target. 
We collect info about three groups : Network , Host , People involved . 

There are two types of footprinting :

Active : Interacting directly with the target to gather information about target. 
Passive : Without connecting to the target the hacker collect information from social media, public websites.

Tools used :
  • Nmap
  • Nessus
  • OpenVAS
  • Nikto
  • Metasploit ( works as Nmap )
SCANNING -

3 types of scanning  involved :

Port scanning: Scanning the target for the information like open ports, live systems, services running on host.
Vulnerability Scanning: Checking for vulnerabilites and weeknesses that can be automated. Usually performed with help of automated tools.
Networking Mapping: Finding the topology of network, routers, firewalls servers, and host information and drawing the network diagram with the available information. This map may serve as a valuable piece of information throughout the haking process.

Tools used :
  • Nmap
  • Websites
  • Social media
GAINING ACCESS -

In this phase hacker breaks into the system/network using various tools and methods. After entering into victims system he has to increase his privilege to administrator level so that he can do any admin tasks such as installing malacious applications, spyware etc.

Methods used:
  • Password attacks
  • Cracking
  • Hash Injection
  • Phishing
  • Password guessing
  • Distributed Networks
  • Rainbow
  • Social Engineering 
  • Dumpster Diving
  • Sholder surfing
MAINTAINING ACCESS -

Hacker may hack the system to show how it's vulnerable, he can be so mischiveous that he wants to maintain or persist the connection in the background without the knowledge of the legitemate user. This can be done using Trojans, Rootkits and malicious files. Common aim is to maintain the access to the target until he finishes tasks he pllanned to accomplish in that target.

Methods used:
  • Trojan
  • Virus
  • Malware
CLEARING TRACKS -

No theif wants to get caught. A hacker must be intelligent enough to clear the evidences (Logs, modifying registry values, uninstalling all applications that are installed, folders) that created. 


For assistance to learn hacking comment below and subscribe our blog.

See you again.Thankyou. 


Post a Comment

0 Comments