Phases of ethical hacking

Phases of Ethical Hacking 


In order to be successful in hacking, a hacker needs to follow some steps or you can say phases which involves 5 crucial stages which helps hackers to make a structured ethical hacking attack.


Reconnaissance :

This is the first phase of hacking where an attacker gathers as much information as possible. It is also called as footprinting or information gathering. Information that we collect is divided in three groups - network, host, people. There are two types of reconnaissance  - Active & Passive.

Active - Direct communication is involved to gather information about the target. Information can be regarding an individual or an organization so anytime if somebody is taking too much interest on you or your background - Be alert! Tools used to scan a network can be Nmap, Hping, etc

Passive - Here indirect communication takes place. Information can be gathered using social media websites or public websites.


Scanning : 

Here an attacker begins to actively scan a target machine or network for vulnerabilities that can be exploited. Three types of scanning are involved - port scanning, vulnerability scanning, network mapping.

Port Scanning - Here an attacker scans the target to gather information regarding open ports, live systems, services running on the host.

Vulnerability Scanning - An attacker checks if a system has some vulnerability or weakness that can be exploited. This is done using automated tools.

Network Mapping - Here an attacker finds  the topology of network, firewall, routers and host information.


Gaining Access -

Here an attacker exploits the vulnerability to enter into a system. After that he needs to increase his privilege to an administrator to be able to modify data or hide data. The tool that is used is Metasploit


Maintaining Access - 

After gaining access the hacker installs some backdoor or trojans in order to enter into the system in future. The aim is to maintain the access until he finishes his task.


Clearing Track - 

Hacker deletes all his logs so he doesn't get caught in the future. Which involves uninstalling of applications, deletion of folders, modifying log values.








Comments

Popular

OSI model

Ethical hacking terminologies