Wednesday, 27 June 2018

Phases Of Hacking & usage of Internet


Phases of hacking :-                

There are five phases that from a structured part of hacking process :-
1. Reconnaissance
2. Scanning
3. Gaining Access             
4. Maintaining Access
5. Covering tracks

 1.      Reconnaissance: - This is the first phase where the Hacker tries to collect information about the target. It may include identifying the Target, finding out the target's IP Range,network, DNS records, etc... This is the Naturally, this is done without the knowledge of target system and user.Much like to military does when they scope out an area they plan to attack...

   2.   Scanning: - In this phase,the informatiom gathered during the reconnaissance phase is uded to scan the perimeter and intrnal network device looking for weaknesses. Scanning is helps the hacker in preparing for his attack. Whether it’s the IP address, type of pockets, operating system in use, all collected information helps the hacker. The hacker can use many tools like Nessuse ,Nmap,OpenVAS,Core Impact Pro etc...

3.  Gaining Access: - In Phase1 & Phase2 hacker had searched and  study about the weaknesses and vulnerabilities of target network. Now, he can use many methods for access the victim network, from LAN, Local access to the PC, the internet...

    4. Maintaining Access: - The key to hacking does not lie in just entering the system, but also staying theire
e. In order to access for a longer time, the attacker must remain stealthy to not get caught using the host enrolment. Hacker could create back doors or Trojan to ensure no other hackers enter the system.

    5.Covering tracks: - As is evident from the name itself, hackers like to clean up the place.Prior to the attack, the hacker would change their MAC address and run the attacking machine through at least one or two VPN to help cover their identity. They will not deliver a direct attack or any scanning technique that would be deemed "noisy". Once access is gained and privileges have been escalated, the hacker seek to cover their tracks. This includes clearing out Sent emails, clearing server log, temporary files, etc...   


  

Be a Safe while using internet… Who know your enemy...😈😈😈


Internet Usage statistics




No comments:

Post a Comment

WEP INSECURITIES

  WEP I NSECURITIES Two researchers from the University of California at Berkeley and one from Zero Knowledge Systems Inc. published a repor...