Process of Ethical Hacking

Process and steps of Hacking



Every project has a sketch of applying the tricks and methods for the project at a different stage. Ethical Hacking also has steps to be followed before performing any task of attacking or preventing attacks. So from the point of view from our resource are given below:-

Footprinting:

                Footprinting is the phase where the attacker gathers information about a target using active or passive means. This process also Known as Reconnaissacne  and information gathering.
Widely used tools in the process :
  • NMAP
  • Hping
  • Maltego
  • Google  Dorks.

Scanning:

          In this process, the attacker begins to actively probe a target machine or network for vulnerabilities that can be exploited.
three type of scanning is done:
  • Port Scanning.
  • Network Scanning.
  • Vulnerability Scanning.
Tools used in the process:
  • Nessus
  • Nexpose
  • NMAP

Gaining Access:

               In this process, the vulnerability is located and you attempt to exploit it in order to enter into the system. The hacker try gaining access using different tools and methods. After gaining access hacker privilege his access to administrator level.
Primary Tool:
  • Metasploit

Maintaining Access:

                   It is the process where the hacker has already gained access into a system. After gaining access, the hacker installs some backdoors in order to enter into the system when he needs access in this owned system in future.
This can be done using trojan, rootkit, and malicious files. The aim is to maintain access until he finish his task.
Preferred Tool:
  • Metasploit

Clearing Tracks:

                This process is actually an unethical activity. It had to do with the deletion of logs of all the activities that take place during the hacking process.

Reporting:

           Reporting is the last step of finishing the ethical hacking process. Here the Ethical Hacker complies a report with his findings and the job that was done such as the tools used, the success rate, vulnerabilities found, and the exploit processes.

:: The above tips are based on our knowledge and methods, you can also use your process according to your need ::

Share you process of attacking a system in comment section.

No comments: