GETTING STARTED WITH HACKING part-2? (PHASES OF HACKING)
SORRY FOR LATE POSTING !
So lets get straight into topic if you haven't read Part 1 of this series Go ASAP and read it
link - > getting started with hacking part1
Basically in short Hackers are of 3 types !
BLACK HAT
WHITE HAT
GREY HAT
We all know about this !
but still a short explaination
BLACK HAT ARE BAD GUYS THEY GAIN UNAUTHORIZED ACCESS , HACK ACCOUNTS AND ALL ILLEGAL THINGS. YOU WILL END UP IN JAIL . DON'T EVER TRY TO BE A BLACK HAT
WHITE HAT ARE GOOD GUYS THEY WORK COMPANIES , THEY PROTECT PEOPLE FROM HACKS!
GREY HAT ARE THE ONE WHO PRETENDS TO BE A WHITE HAT BUT IS A BLACK HAT HACKER!!
In my last article i told you about using Kali Linux because of the essential pre installed exploits !
LETS START
For a successful hack you these steps have to be followed !
1. RECONNAISSANCE : This is the first step of hacking where we gain as much of the target. usually information collected is of
- network
- host
- people involved ( for social engineering purpose)
this is also called foot-printing or information gathering
there are two type of footprinting
active: when you interact directly to the target and gain info about target like using port scanning software etc.
passive : when you indirectly gain info about the target . like collecting info from social media pages , public websites etc.
2. SCANNING: This phase involves 3 steps
port scanning : Scanning the target network for open ports , various services running . NMAP is the most popular port scanner!
Vulnerability scanning : we scan for various vulnerability of the target to be exploited .
Network mapping : finding the topology of network , routers , firewalls if any.
3.GAINING ACCESS : Can be guessed name when hackers gain access to target system using various exploits to gain his privilege to admin level to install software and modify data!
4.MAINTAINING ACCESS : Even the hack is completed you can access the system when ever you wany by creating a persistent connection in background without the knowledge of user! this can be done by installing trojans , rootkits etc.
5. CLEARING TRACKS: no one wants to get caught ! so it is very important step . it is done by clearing the log of the target system or by modifying the registry and by uninstalling the software or programs used on that system by you to execute the hack.
NEXT ARTICLE WILL BE COVERING ABOUT SOME MORE BASICS OF HACKING ! KEEP SUPPORTING
Comments
Post a Comment