Phases of Hacking

By | May 11, 2019

Phases of hacking :

There are mainly 5 stages for hacking

  • Reconnaissance
  • Scanning
  • Gaining  Access
  • Maintaining Access
  • Covering Tracks

It is the First step of hacking also called Footprinting, Here we collect as much information as possible about Target.

  • Network
  • Host
  • Server
  • People

There are two  types of Reconnaissances:

Active Reconnaissance: Here we are Directly interacting with the target to collect the information.

Passive Reconnaissance: Trying to collect information about the target without interacting with the target, collecting information from social networking sites, public websites, etc.

— Hping, Nmap, Maltego, Google Dorks.

Scanning :

Taking information from Recon and using it to examine the network. Seeking information such as IP address, open ports, running services, user accounts, etc.

— Nmap, Nessus, Nexpose.

  Different types of scanning are there:

  • Port  Scanning
  • Vulnerability Scanning
  • Network Mapping

Port Scanning:

Scanning the target for information like open ports ,live systems, various services running on the host machine.

Vulnerability  Scanning:

Checking the target for weakness or vulnerabilities which can be exploited usually by automated tools.

–metasploit framework

Gaining Access:
Breaks into the  system/network using various tools  and methods increase privileges to administrator

Maintaining Access:

Maintaining the connection in the background without the knowledge to the user. This can be done using Trojans, Rootkits or other malicious files.

Clearing Tracks:

Clearing all tracks and evidence, so that  in later no one will find any traces leading to him

–modifying/corrupting/deleting the log files.

Author: Ravi Sarode, founder of I am an Ethical Hacker, Web Application Penetration Tester and Security Researcher

Leave a Reply

Your email address will not be published. Required fields are marked *