DIFFERENT PHASES IN HACKING






DIFFERENT PHASES IN HACKING:
1. INFORMATION GATHERING / FOOT PRINTING
2. PORT SCANNING
3. NETWORK SCANNING
4. SOFTWARE DETECTION SCAN
5. OS FINGER PRINTING
6. VULNERABILITY SCANNING
7. SEARCH AND BUILD EXPLOIT
8. ATTACK WITH EXPLOIT
9. MAINTAIN ACCESS WITH PAYLOADS / BACK-DOORS
10. COVERING TRACKS / CLEARING EVIDENCES

1. FOOT PRINTING

FOOT PRINTING IS THE FIRST STEP IN HACKING PROESS WHERE TTHE HACKER COLLECT'S AS MUCH AS DETAILED INFORMATION AS POSSIBLE ABOUT THE TARGET.

2. PORT SCANNING


IT IS A METHOD TO IDENTIFY ACTIVE PORTS, SOFTWARE'S AND OPERATING SYSTEM RUNNING ON THE VICTIMS COMPUTER.

A COMPUTER CONTAINS 65,536 VIRTUAL PORTS.

3. NETWORK SCANNING.

IT IS SIMILAR TO PORT SCANNING BUT IT IS DONE ON LAN.

4. SOFTWARE DETECTION SCAN :

IN THIS WE IDENTIFY THE SOFTWARE'S RUNNING IN THE TARGET SYSTEM.
IT INCLUDES BROWSER,MEDIA PLAYER ETC.

5. OS FINGER PRINTING :

IN THIS WE IDENTIFY OR CONFIRM THE TARGET OPERATING SYSTEM.

IT INCLUDES LINUX,WINDOWS,MAC ETC.
6. VULNERABILITY SCANNING

THE METHOD TO IDENTIFY VULNERABLE HOSTS WITH SUPPORT OF SCANNER AND THEN CLASSIFYING THE VULNERABILITIES IN RANKING ORDER.

7. SEARCH AND BUILD EXPLOIT

ACCORDING TO THE VULNERABILITIES WE SEARCH FOR ANY PRE EXISTED PAYLOADS AND USE THEM.

8. ATTACK WITH EXPLOIT

USING THE PAYLOAD EXPLOIT IS DONE .

9. MAINTAIN ACCESS WITH PAYLOADS / BACKDOOR

CREATING OF BACKDOOR FOR FUTURE PURPOSE SO THAT IT CAN BE ACCESSED EASILY IN FUTURE.

10. COVERING TRACKS / CLEARING EVIDENCES

REMOVING ALL EVIDENCES SO THAT THE END USER DOESN'T GETS NOTIFIED THAT HIS SYSTEM WAS HACKED. 

No comments

HACKING STUFF. Powered by Blogger.