Phases of hacking :
There are mainly 5 stages for hacking
- Gaining Access
- Maintaining Access
- Covering Tracks
It is the First step of hacking also called Footprinting, Here we collect as much information as possible about Target.
There are two types of Reconnaissances:
Active Reconnaissance: Here we are Directly interacting with the target to collect the information.
Passive Reconnaissance: Trying to collect information about the target without interacting with the target, collecting information from social networking sites, public websites, etc.
— Hping, Nmap, Maltego, Google Dorks.
Taking information from Recon and using it to examine the network. Seeking information such as IP address, open ports, running services, user accounts, etc.
— Nmap, Nessus, Nexpose.
Different types of scanning are there:
- Port Scanning
- Vulnerability Scanning
- Network Mapping
Scanning the target for information like open ports ,live systems, various services running on the host machine.
Checking the target for weakness or vulnerabilities which can be exploited usually by automated tools.
Breaks into the system/network using various tools and methods increase privileges to administrator
Maintaining the connection in the background without the knowledge to the user. This can be done using Trojans, Rootkits or other malicious files.
Clearing all tracks and evidence, so that in later no one will find any traces leading to him
–modifying/corrupting/deleting the log files.