DIFFERENT PHASES IN HACKING
DIFFERENT PHASES IN HACKING:
1. INFORMATION GATHERING / FOOT PRINTING
2. PORT SCANNING
3. NETWORK SCANNING
4. SOFTWARE DETECTION SCAN
5. OS FINGER PRINTING
6. VULNERABILITY SCANNING
7. SEARCH AND BUILD EXPLOIT
8. ATTACK WITH EXPLOIT
9. MAINTAIN ACCESS WITH PAYLOADS / BACK-DOORS
10. COVERING TRACKS / CLEARING EVIDENCES
1. FOOT PRINTING
FOOT PRINTING IS THE FIRST STEP IN HACKING PROESS WHERE TTHE HACKER COLLECT'S AS MUCH AS DETAILED INFORMATION AS POSSIBLE ABOUT THE TARGET.
2. PORT SCANNING
IT IS A METHOD TO IDENTIFY ACTIVE PORTS, SOFTWARE'S AND OPERATING SYSTEM RUNNING ON THE VICTIMS COMPUTER.
A COMPUTER CONTAINS 65,536 VIRTUAL PORTS.
3. NETWORK SCANNING.
IT IS SIMILAR TO PORT SCANNING BUT IT IS DONE ON LAN.
4. SOFTWARE DETECTION SCAN :
IN THIS WE IDENTIFY THE SOFTWARE'S RUNNING IN THE TARGET SYSTEM.
IT INCLUDES BROWSER,MEDIA PLAYER ETC.
5. OS FINGER PRINTING :
IN THIS WE IDENTIFY OR CONFIRM THE TARGET OPERATING SYSTEM.
IT INCLUDES LINUX,WINDOWS,MAC ETC.
6. VULNERABILITY SCANNING
THE METHOD TO IDENTIFY VULNERABLE HOSTS WITH SUPPORT OF SCANNER AND THEN CLASSIFYING THE VULNERABILITIES IN RANKING ORDER.
7. SEARCH AND BUILD EXPLOIT
ACCORDING TO THE VULNERABILITIES WE SEARCH FOR ANY PRE EXISTED PAYLOADS AND USE THEM.
8. ATTACK WITH EXPLOIT
USING THE PAYLOAD EXPLOIT IS DONE .
9. MAINTAIN ACCESS WITH PAYLOADS / BACKDOOR
CREATING OF BACKDOOR FOR FUTURE PURPOSE SO THAT IT CAN BE ACCESSED EASILY IN FUTURE.
10. COVERING TRACKS / CLEARING EVIDENCES
REMOVING ALL EVIDENCES SO THAT THE END USER DOESN'T GETS NOTIFIED THAT HIS SYSTEM WAS HACKED.
Leave a Comment