Phases of Hacking
1. Reconnaissance:
This is step one of Hacking. It is likewise referred to as as Footprinting and statistics amassing Phase. This is the preparatory segment in which we accumulate as a good deal statistics as feasible approximately the goal. We normally accumulate statistics approximately 3 groups,
- Network
- Host
- People involved
There are varieties of Footprinting:
- Active: Directly interacting with the goal to collect statistics approximately the goal. Eg Using Nmap device to experiment the goal
- Passive: Trying to accumulate the statistics approximately the goal with out without delay having access to the goal. This entails amassing statistics from social media, public web sites etc.
2. Scanning:
Three varieties of scanning are involved:
- Port scanning: This segment entails scanning the goal for the statistics like open ports, Live systems, diverse offerings jogging at the host.
- Vulnerability Scanning: Checking the goal for weaknesses or vulnerabilities which may be exploited. Usually finished with assist of automatic gear
- Network Mapping: Finding the topology of community, routers, firewalls servers if any, and host statistics and drawing a community diagram with the to be had statistics. This map might also additionally function a treasured piece of statistics at some point of the haking process.
3. Gaining Access:
This segment is in which an attacker breaks into the gadget/community the usage of diverse gear or methods. After moving into a gadget, he has to boom his privilege to administrator stage so he can set up an software he desires or alter records or conceal records.
4. Maintaining Access:
Hacker might also additionally simply hack the gadget to reveal it become prone or he may be so mischievous that he desires to keep or persist the relationship withinside the history with out the understanding of the user. This may be finished the usage of Trojans, Rootkits or different malicious files. The goal is to keep the get entry to to the goal till he finishes the obligations he deliberate to perform in that goal.
5. Clearing Track:
No thief desires to get caught. An clever hacker constantly clears all proof in order that withinside the later factor of time, no person will discover any lines main to him. This entails editing/corrupting/deleting the values of Logs, editing registry values and uninstalling all programs he used and deleting all folders he created.