Skip to main content

What are Phases of Hacking ?

PHASES OF HACKING




Phases of Hacking:-

There are mainly 5 phases in hacking. Not necessarily a hacker has to follow these 5 steps in a sequential manner. It’s a step wise process and when followed yields a better result.


1.Reconnaissance
2.Scanning
3.Gaining Access
4.Maintaining Access
5.Clearing Track


Now i will explain each of the phases clearly !!


1. Reconnaissance:



This is the first step of Hacking. It is also called as Footprinting and information gathering Phase. This is the preparatory phase where we collect as much information as possible about the target. We usually collect information about three groups,

      

  1. Network
  2. Host
  3. People Involved

There are two types of Footprinting:

Active: Directly interacting with the target to gather information about the target. Eg: Using Nmap tool to scan the target


Passive: Trying to collect the information about the target without directly accessing the target.


This involves collecting information from social media, public websites etc.


 2. Scanning:



  Three types of scanning are involved:


⭕️ Port scanning: 

In this phase we scan the target for the information like open ports, Live systems, various services running on the host.



⭕️ Vulnerability Scanning:

Checking for weaknesses or vulnerabilities which can be exploited. Usually this can be done with help of automated tools.



⭕️ Network Mapping:

Finding the topology or map of network, routers, firewalls servers if any, and host information and drawing a network diagram with the available information.


 This map may serve as a valuable information throughout the haking process.    


3. Gaining Access:



 This is the phase where an attacker breaks into the system using various methods and tools.

After entering into the system, he/She has to increase his/her privilege to administrator level. So he can install / Modify / Hide / Delete any application.

4. Maintaining Access :



  It is very necessary to maintain access to the target until attacker finishes the tasks he planned to accomplish in that target..

So he should maintain or persist the connection in the background without the knowledge of the user. This can be done using Trojans, Rootkits or other malicious files.

5. Clearing Tracks:



 Nobody wants to caught. An intelligent hacker always clear evidences so that in later point of time , no one will find any traces leading to him.

This involves modifying/corrupting/deleting the logs and modifying registry values, deleting applications he used and deleting folders he used. 


Author:- Sandeep

I hope i have given good information about phases of hacking if anything missed comment below

 ðŸ‘‡ðŸ‘‡ 

Comments

Post a Comment

Popular posts from this blog

Embed Backdoor in any Android app | Android Hacking | Tricky Hash |

  H OW TO  CREATE A ANDROID TROJAN INTRO Everybody  install and use apps these days. So, the easiest way to hack a android by embed a Backdoor to a normal apk File. Now, install this apk file in your Victim's phone by using some Social Engineering trick.  When it is executed the user will see a normal app but in the same time our Backdoor will be running in the Background. REQUIREMENTS A Legitimate android apk file. Kali Linux  The FATRAT (Linux Tool) PROCEDURE   To embed Backdoor in any legitimate apk, we use fatrat. We have to install Fatrat in out terminal. Fatrat is used to generate local or remote listeners. It can generate payloads in various formats.  To Install Fatrat we'll have to use the following commands:  git clone  https://github.com/Screetsec/TheFatRat.git After cloning into TheFatRat now type: ls (enter) cd TheFatRat (enter) ls (enter) chmod +x setup.sh (enter) ls (enter) ./setup.sh (enter) It will automatically install all th...

CARDING!(BASICS,PROCEDURES,PRECAUTIONS,CONSEQUENCES)

part-1  * Why does the bank card number have #16 digits and what do these number s mean? * * 16 digits * on the card contains important information and * 6 digits * The first is the bank identification number and specifies which bank issued the card.  By examining these * 6 digits *, programmers will recognize the card issuing bank. "Brought to you by the Dark Army. * (Bank Identification Number) *   they say.  This number for some banks is as follows: Bank name Bank                       Bank Code      ----                       --------- Chemical Bank                    1263 Marine Midland                   6207 [1207?] Manufacturers Hanover Trust      1033 Citibank               ...

How to Guess any Password like Hackers Do | Password Cracking | Ethical Hacking |

In this article, I am going to tell you how Hackers and Crackers crack the password by Guessing. After reading this, you will be able to start think like a hacker. They use some methodologies while guessing and cracking passwords. So let's dive into it:  1. Guess the most common passwords At the end of every year, a list of the 25 most common passwords is released. These passwords are the easiest to guess and thus the most commonly hacked. Though you should avoid picking any of these passwords for yourself, try guessing from this list of passwords: 123456@  12345678  abc123  qwerty  monkey  letmein  dragon  baseball iloveyou  trustno1 1234567  sunshine  master  123123  welcome  shadow  Ashley  football  Jesus  Michael  ninja  mypassword  password1 2. Use some common password tricks  Other than guessing the most obvious passwords, there are a some tricks that are used by hackers....