Ethical Hacking - Overview - Phase Of Hacking Tutorial
It is about gathering information of a target system. It is also known as reconnaissance. This is 1st Step of hacking.
The tools used to gather information are NMAP, Hping, Maltego, and Google Dorks.
This is pre-attack phase when the hacker scans the target system using specific information gathered during the first step of reconnaissance.
It target OS, open port and services and vulnerable applications.
The tools used to gather information are Nessus, Nexpose, and NMAP..
In this Phase , Hacker will try to attack on the target system and try to gain access on the basis of information gathered in the previous phase.
The tool used in this process is metasploit.
After gaining access to target system, then the next phase is to maintain access.
In order to maintain access to the target system and control it. A hacker will install following application.
Backdoors (use to enter system whenever needed)
In this hacker will perform certain action on the target system i.e to increase shell life which is being used to control the target system and to maintaining the anonymity of attacker, so the attacker could not get traced back.
It can be done by deletion of all logs of the activity done during hacking process.
This is final process, where ethical hacker generate report on the basis of vulnerabilities found, tools used and the exploit process.
Best learning portal that provides you great learning experience of various technologies with modern compilation tools and technique
Don't hesitate to give us a call or send us a contact form message