Ethical Hacking - Overview - Phase Of Hacking Tutorial
- Information Gathering
It is about gathering information of a target system. It is also known as reconnaissance. This is 1st Step of hacking.
The tools used to gather information are NMAP, Hping, Maltego, and Google Dorks.
- Scanning
This is pre-attack phase when the hacker scans the target system using specific information gathered during the first step of reconnaissance.
It target OS, open port and services and vulnerable applications.
The tools used to gather information are Nessus, Nexpose, and NMAP..
- Gaining Access
In this Phase , Hacker will try to attack on the target system and try to gain access on the basis of information gathered in the previous phase.
The tool used in this process is metasploit.
- Maintaining Access
After gaining access to target system, then the next phase is to maintain access.
In order to maintain access to the target system and control it. A hacker will install following application.
- RATs
- Trojans
- Backdoors (use to enter system whenever needed)
- Rootkits
- Clearing Tracks
In this hacker will perform certain action on the target system i.e to increase shell life which is being used to control the target system and to maintaining the anonymity of attacker, so the attacker could not get traced back.
It can be done by deletion of all logs of the activity done during hacking process.
- Reporting
This is final process, where ethical hacker generate report on the basis of vulnerabilities found, tools used and the exploit process.