Every Ethical hacker plans his every hack and then performs the hack into certain stages and these phases are the most important part of any well planned hack because without any plan you will not know what to do next so in your journey of becoming an ethical hacker you should know these stages by heart.
1)Footprinting/Reconnaissance
Fooprinting or Reconnaissance is the first step of any well planned hack, In this stage hacker tries to collect's all possible information of the target that are available online, it includes stuffs like sub-domains,IP address, no.of host,emails,DNS,etc.
2) Scanning
Now after collecting some rich information of the target, hacker scans the target for vulnerablties, he performs many scans on the target to find out what kind of services are used by the target like searching the version of Apache server,operating system running on the box, open ports,firewalls detection and many more stuffs.
3) Attacking
On the basis of scanning results the hackers exploits vulnerabilities of the target, In simple words he/she attacks the victim on the weaknesses found while scanning for example; If there is fault in SQL database then hacker will do an SQL injection,If target is using the old operating system he will set a payload for it; If target has a less bandwidth then hacker will perform a Ddos attack and it keep on going with the vulnerabilities found.
4) Maintaining Access
After the attack got successful and all the information's of the company are copied, hacker setup a backdoor on the target machine which will help him/her to get information about the targets activities without getting caught, backdoor are fully undetectable(FUD).
5) Covering Tracks
When is done, when he/she has enough of the information of the target and thinks that they are done with hacking the target then they covers the track from which they comes in, by deleting logs, backdoor, uninstalling rat and reverting the changes made.
These are the stage/phases of hacking, which is the key for any successful hack always remember then always in your journey to ethical hacker, For any query and questions please comment
No comments:
Post a Comment