ad1

GETTING STARTED WITH HACKING part-2? (PHASES OF HACKING)


SORRY FOR LATE POSTING !

So lets get straight into topic if you haven't read Part 1 of this series Go ASAP and read it

link  - > getting started with hacking part1

Basically in short Hackers are of 3 types !

BLACK HAT 

WHITE HAT

GREY HAT

We all know about this !

but still a short explaination

BLACK HAT ARE BAD GUYS THEY GAIN UNAUTHORIZED ACCESS , HACK ACCOUNTS AND ALL ILLEGAL THINGS. YOU WILL END UP IN JAIL . DON'T EVER TRY TO BE A BLACK HAT

WHITE HAT ARE GOOD GUYS THEY WORK COMPANIES , THEY PROTECT PEOPLE FROM HACKS!

GREY HAT ARE THE ONE WHO PRETENDS TO BE A WHITE HAT BUT IS A BLACK HAT HACKER!!

In my last article i told you about using  Kali Linux because of the essential pre installed exploits !

LETS START




For a successful hack you these steps have to be followed ! 

1. RECONNAISSANCE : This is the first step of hacking where we gain as much of the target. usually information collected is of

- network
- host
- people involved ( for social engineering purpose)

this is also called foot-printing or information gathering 

there are two type of footprinting

active:   when you interact directly to the target and gain info about target like using port scanning software etc.

passive : when you indirectly gain info about the target . like collecting info from social media pages , public websites etc.


2. SCANNING:   This phase involves 3 steps

port scanning : Scanning the target network for open ports , various services running . NMAP is the most popular port scanner!

Vulnerability scanning : we scan for various vulnerability of the target to be exploited .

Network mapping :  finding the topology of network , routers , firewalls if any.

3.GAINING ACCESS :  Can be guessed name when hackers gain access to target system using various exploits to gain his privilege to admin level to install  software and modify data!


4.MAINTAINING ACCESS :  Even the hack is completed you can access the system when ever you wany by creating a persistent connection in background without the knowledge of user! this can be done by installing trojans , rootkits etc.


5. CLEARING TRACKS:  no one wants to get caught ! so it is very important step . it is done by clearing the log of the target system or  by modifying the registry and by uninstalling the software or programs used on that system by you to execute the hack.



NEXT ARTICLE WILL BE COVERING ABOUT SOME MORE BASICS OF HACKING ! KEEP SUPPORTING






Comments

Popular Posts