Sunday 5 November 2017

Phases Of Hacking


Every Ethical hacker plans his every hack and then performs the hack into certain stages and these phases are the most important part of any well planned hack because without any plan you will not know what to do next so in your journey of becoming an ethical hacker you should know these stages by heart.

 1)Footprinting/Reconnaissance

Fooprinting or Reconnaissance is the first step of any well planned hack, In this stage hacker tries to collect's all possible information of the target that are available online, it includes stuffs like sub-domains,IP address, no.of host,emails,DNS,etc.

2) Scanning

Now after collecting some rich information of the target, hacker scans the target for vulnerablties, he performs many scans on the target to find out what kind of services are used by the target like searching the version of Apache server,operating system running on the box, open ports,firewalls detection and many more stuffs.

3) Attacking

On the basis of scanning results the hackers exploits vulnerabilities of the target, In simple words he/she attacks the victim on the weaknesses found while scanning for example; If there is fault in SQL database then hacker will do an SQL injection,If target is using the old operating system he will set a payload for it; If target has a less bandwidth then hacker will perform a Ddos attack and it keep on going with the vulnerabilities found.

4) Maintaining Access

 After the attack got successful and all the information's of the company are copied, hacker setup a backdoor on the target machine which will help him/her to get information about the targets activities without getting caught, backdoor are fully undetectable(FUD).

5) Covering Tracks

When is done, when he/she has enough of the information of the target and thinks that they are done with hacking the target then they covers the track from which they comes in, by deleting logs, backdoor, uninstalling rat and reverting the changes made.

These are the stage/phases of hacking, which is the key for any successful hack always remember then always in your journey to ethical hacker, For any query and questions please comment

No comments:

Post a Comment

Get Complete Html Tags

Get Complete All Html Tags Downloade Pdf by Here >>>  Click Here