Phases of hacking :-
There are five phases that from a structured part of hacking process :-
1. Reconnaissance
2. Scanning
3. Gaining Access
4. Maintaining Access
5. Covering tracks
1.
Reconnaissance: - This is the first phase where the Hacker tries to collect information about the target. It may include identifying the Target, finding out the target's IP Range,network, DNS records, etc... This is the Naturally, this is done without the
knowledge of target system and user.Much like to military does when they scope
out an area they plan to attack...
2. Scanning: - In this phase,the informatiom gathered during the reconnaissance phase is uded to scan the perimeter and intrnal network device looking for weaknesses. Scanning is helps the hacker in preparing for his attack. Whether it’s the IP
address, type of pockets, operating system in use, all collected information
helps the hacker. The hacker can use many tools like Nessuse ,Nmap,OpenVAS,Core Impact Pro etc...
3. Gaining Access: - In Phase1 & Phase2 hacker had searched
and study about the weaknesses and vulnerabilities of target network. Now, he
can use many methods for access the victim network, from LAN, Local access to
the PC, the internet...
4. Maintaining Access: - The key to hacking does not lie in just
entering the system, but also staying theire
e. In order to access for a longer
time, the attacker must remain stealthy to not get caught using the host enrolment.
Hacker could create back doors or Trojan to ensure no other hackers enter the
system.
5.Covering tracks: - As is evident
from the name itself, hackers like to clean up the place.Prior to the attack, the hacker would change their MAC address and run the attacking machine through at least one or two VPN to help cover their identity. They will not deliver a direct attack or any scanning technique that would be deemed "noisy". Once access is gained and privileges have been escalated, the hacker seek to cover their tracks. This includes clearing out Sent emails, clearing server log, temporary files, etc...
Be a Safe while using internet… Who
know your enemy...😈😈😈
Internet Usage statistics
No comments:
Post a Comment