As mentioned earlier ethical hacker takes same steps as malicious hacker. Following are different steps that are performed during hacking.
1.Reconnaissance:
This step involves gathering potential information about target system. In fact hacker spends 90% of time for this phase only and next 10% time for rest of the steps.
2.Scanning:
During this phase network is scanned for vulnerability.
3.Gaining Access:
This is the step where real hacking takes place. Hacker takes advantage of vulnerability found in scanning phase and penetrates the victim system.
4.Maintaining Access:
After gaining access hacker makes provision to come back by planting root-kit and backdoor.
5.Covering Tracks:
In this phase hacker removes all traces of his/her presence in system by removing log files and event logs.
1.Reconnaissance:
This step involves gathering potential information about target system. In fact hacker spends 90% of time for this phase only and next 10% time for rest of the steps.
2.Scanning:
During this phase network is scanned for vulnerability.
3.Gaining Access:
This is the step where real hacking takes place. Hacker takes advantage of vulnerability found in scanning phase and penetrates the victim system.
4.Maintaining Access:
After gaining access hacker makes provision to come back by planting root-kit and backdoor.
5.Covering Tracks:
In this phase hacker removes all traces of his/her presence in system by removing log files and event logs.
0 comments:
Post a Comment
Got any doubts or feedbacks ?
Feel free to comment !