PHASES OF HACKING
Phases of Hacking:-
There are mainly 5 phases in hacking. Not necessarily a hacker has to follow these 5 steps in a sequential manner. It’s a step wise process and when followed yields a better result.
1.Reconnaissance
2.Scanning
3.Gaining Access
4.Maintaining Access
5.Clearing Track
Now i will explain each of the phases clearly !!
1. Reconnaissance:
This is the first step of Hacking. It is also called as Footprinting and information gathering Phase. This is the preparatory phase where we collect as much information as possible about the target. We usually collect information about three groups,
- Network
- Host
- People Involved
Active: Directly interacting with the target to gather information about the target. Eg: Using Nmap tool to scan the target
Passive: Trying to collect the information about the target without directly accessing the target.
This involves collecting information from social media, public websites etc.
2. Scanning:
Three types of scanning are involved:
⭕️ Port scanning:
In this phase we scan the target for the information like open ports, Live systems, various services running on the host.
⭕️ Vulnerability Scanning:
Checking for weaknesses or vulnerabilities which can be exploited. Usually this can be done with help of automated tools.
⭕️ Network Mapping:
Finding the topology or map of network, routers, firewalls servers if any, and host information and drawing a network diagram with the available information.
This map may serve as a valuable information throughout the haking process.
3. Gaining Access:
4. Maintaining Access :
So he should maintain or persist the connection in the background without the knowledge of the user. This can be done using Trojans, Rootkits or other malicious files.
5. Clearing Tracks:
Nobody wants to caught. An intelligent hacker always clear evidences so that in later point of time , no one will find any traces leading to him.
This involves modifying/corrupting/deleting the logs and modifying registry values, deleting applications he used and deleting folders he used.
Author:- Sandeep
I hope i have given good information about phases of hacking if anything missed comment below
👇👇
hlo bro its me waqas from insta
ReplyDelete