PHASES OF HACKING

PHASES OF HACKING

HACKING PHASES:
In this article we are going to learn about phases of hacking in detail. A hacker definitely should follow this steps to protect or attack a particular target. There is no specific rule or something that a hacker needs to follow this phases in specific order. But, this phases helps to accomplish the task that a hacker needs.
There are five phases in hacking:
1. Reconnaissance
2. Scanning
3. Gaining Access
4. Maintaining Access
5. Covering tracks
RECONNAISSANCE:
This is the first step in phases of hacking mainly involves of gathering full information about the target as much as possible. Reconnaissance is also known as Foot Printing. Information gathering contains Networks, Hosts, DNS records, etc. 
Foot printing classified into two types:
1. Active Foot Printing.
2. Passive Foot Printing.
Active Foot Printing: This includes direct interaction with the target to gather information.
Passive Foot Printing: This includes indirect interaction with the target to gather information from the Websites, Social Networks, etc.
SCANNING:
 By using information gathered in first step a hacker finds more information about the target using Scanning. Scanning further classified into three types:
1. Port Scanning
2. Network Scanning
3. Vulnerability Scanning
Port Scanning: This scanning is used to find open ports and services that are targeted. In order to understand this scanning one should know about ports and port numbers too.
Well Known Ports: 0 - 1023
Registered Ports: 1024 - 49151
Dynamic Ports: 49152 - 65535
Network Scanning: This scanning is used to find IP addresses, Operating systems, total architecture of particular network system. 
Vulnerability Scanning: This scanning is used to find weakness of the target.
GAINING ACCESS:
In this step the hacker exploits all the vulnerabilities that are gathered to gain access of the target such as Systems, Networks, etc and then hacker tries to take over all the control privileges of target so that hacker can remove or add or hide data.
MAINTAINING ACCESS:
This step involves of maintaining position in the target to steal or manipulate data that can be done with help of different malicious files. Whenever a hacker gains access for further exploitation they keeps that data to attack again until they accomplish the task.
COVERING TRACKS:
If a hacker gains and maintains all the access than the hacker covers the tracks to make untraceable by security personnel. In order to remove traces of hacking a hacker removes all the evidences regarding attack that involves clearing of cookies, log files, applications, etc.

For more interesting hacking related topics stay connected to this blog by subscribing: hackersocietyblog

Post a Comment

0 Comments