alternative
  • Home (current)
  • About
  • Tutorial
    Technologies
    Deep Learning
    Statistics for AIML
    Natural Language Processing
    Machine Learning
    SQL -Structured Query Language
    Python
    Ethical Hacking
    Java
    Placement Preparation
    Quantitative Aptitude
    View All Tutorial
  • Quiz
    SQL -Structured Query Language
    Quantitative Aptitude
    Java
    View All Quiz Course
  • Q & A
    Quantitative Aptitude
    Java
    View All Q & A course
  • Programs
  • Articles
    Artificial Intelligence & Machine Learning Project
    How to publish your local website on github pages with a custom domain name?
    How to download and install Xampp on Window Operating System ?
    How To Download And Install MySql Workbench
    How to install Pycharm ?
    How to install Python ?
    How to download and install Visual Studio IDE taking an example of C# (C Sharp)
    View All Post
  • Tools
    Program Compiler
    Sql Compiler
    Replace Multiple Text
    Meta Data From Multiple Url
  • Contact
  • User
    Login
    Register

Ethical Hacking - Overview - Phase Of Hacking Tutorial

  • Information Gathering

It is about gathering information of a target system. It is also known as reconnaissance. This is 1st Step of hacking.

The tools used to gather information are NMAP, Hping, Maltego, and Google Dorks.

  • Scanning

This is pre-attack phase when the hacker scans the target system using specific information gathered during the first step of reconnaissance.

It target OS, open port and services and vulnerable applications.

The tools used to gather information are Nessus, Nexpose, and NMAP..

 

  • Gaining Access

In this Phase , Hacker will try to attack on the target system and try to gain access on the basis of information gathered in the previous phase.

The tool used in this process is metasploit.

  • Maintaining Access

After gaining access to target system, then the next phase is to maintain access.

In order to maintain access to the target system and control it. A hacker will install following application.

  1. RATs
  2. Trojans
  3. Backdoors (use to enter system whenever needed)
  4. Rootkits
  • Clearing Tracks

In this hacker will perform certain action on the target system i.e  to increase shell life which is being used to control the target system and to maintaining the anonymity of attacker, so the attacker could not get traced back.

It can be done by deletion of all logs of the activity done during hacking process.

  • Reporting

This is final process, where ethical hacker generate report on the basis of vulnerabilities found, tools used and the exploit process.

Ethical Hacking

Ethical Hacking

  • Introduction
  • Overview
    • Information Technology
    • Ethical Hacking
    • Types Of Hacker
    • Phase Of Hacking
  • Environmental Setup
    • Download Virtual Box
    • Install Kali Linux OS in Virtual Box
    • Resize Kali Linux To Full Screen
  • Ethical Hacking Phases
    • Common Technique to Gather Information
    • Reconnaisance / Footprinting
    • Fingerprinting
    • Sniffing
    • ARP Poisioning
    • SQL Injection
    • Cross Site Scripting
    • Social Engineering
    • Denial of service Attack
    • Session Hijacking

About Fresherbell

Best learning portal that provides you great learning experience of various technologies with modern compilation tools and technique

Important Links

Don't hesitate to give us a call or send us a contact form message

Terms & Conditions
Privacy Policy
Contact Us

Social Media

© Untitled. All rights reserved. Demo Images: Unsplash. Design: HTML5 UP.