Phases Of Hacking
1.Reconnaissance: This is the first step of Hacking. It is also called as Footprinting and information gathering Phase. This is the preparatory phase where we collect as much information as possible about the target. We usually collect information about three groups
3.Gaining Access: In this phase,Attacker actually performs Hack. Using the information or vulnerability found by previous phase, attacker task advantage and perform exploit to gain access.
4.Maintaining Access: In this phase, Attacker installs backdoors or Trojans in order to maintain access into the target system.
5.Covering Tracks: In this phase, Attacker deletes the logs and session details in order to not be get caught.
- Network
- Host
- People Involved
There are two type of Footprinting:
- Active: Directly interacting with the target to gather information about the target. Eg Using Nmap tool to scan the target
- Passive: Trying to collect the information about the target without directly accessing the target. This involves collecting information from social media, public websites etc.
3.Gaining Access: In this phase,Attacker actually performs Hack. Using the information or vulnerability found by previous phase, attacker task advantage and perform exploit to gain access.
4.Maintaining Access: In this phase, Attacker installs backdoors or Trojans in order to maintain access into the target system.
5.Covering Tracks: In this phase, Attacker deletes the logs and session details in order to not be get caught.
Comments
Post a Comment