Phases of Hacking | Ethical Hacking (2024)

There are mainly 5 phases in hacking. Not necessarily a hacker has to follow these 5 steps in a sequential manner. It’s a stepwise process and when followed yields a better result.

Phases of Hacking | Ethical Hacking (1)

1. Reconnaissance:

This is the first step of Hacking. It is also called as Footprinting and information gathering Phase. This is the preparatory phase where we collect as much information as possible about the target. We usually collect information about three groups,

  1. Network

  2. Host

  3. People involved

There are two types of Footprinting:

  • Active: Directly interacting with the target to gather information about the target. Eg Using Nmap tool to scan the target

  • Passive: Trying to collect the information about the target without directly accessing the target. This involves collecting information from social media, public websites etc.

2. Scanning:

Three types of scanning are involved:

  • Port scanning: This phase involves scanning the target for the information like open ports, Live systems, various services running on the host.

  • Vulnerability Scanning: Checking the target for weaknesses or vulnerabilities which can be exploited. Usually done with help of automated tools

  • Network Mapping: Finding the topology of network, routers, firewalls servers if any, and host information and drawing a network diagram with the available information. This map may serve as a valuable piece of information throughout the haking process.

3. Gaining Access:

This phase is where an attacker breaks into the system/network using various tools or methods. After entering into a system, he has to increase his privilege to administrator level so he can install an application he needs or modify data or hide data.

4. Maintaining Access:

Hacker may just hack the system to show it was vulnerable or he can be so mischievous that he wants to maintain or persist the connection in the background without the knowledge of the user. This can be done using Trojans, Rootkits or other malicious files. The aim is to maintain the access to the target until he finishes the tasks he planned to accomplish in that target.

5. Clearing Track:

No thief wants to get caught. An intelligent hacker always clears all evidence so that in the later pointoftime, no one will find any traces leading to him. To achieve this, the hacker focuses on modifying/corrupting/deleting the valuesofLogs, altering registry values, uninstalling all applications used, and deleting all folders created. In the eventofa compromised site, it becomes crucial to promptly address andfix the hacked siteto minimize potential damage and prevent further unauthorized access.

Phases of Hacking | Ethical Hacking (2024)
Top Articles
Taylor Swift Is A Certified Billionaire According to 'Forbes'—Here's What We Know About Her Net Worth
AI and Ethics: Navigating the Challenges of the Technological Age
Palm Coast Permits Online
Mountain Dew Bennington Pontoon
Faint Citrine Lost Ark
Mcfarland Usa 123Movies
A Complete Guide To Major Scales
Cumberland Maryland Craigslist
Mail Healthcare Uiowa
Craigslistdaytona
Alaska Bücher in der richtigen Reihenfolge
Walgreens On Nacogdoches And O'connor
Blue Beetle Showtimes Near Regal Swamp Fox
Bahsid Mclean Uncensored Photo
Arboristsite Forum Chainsaw
Craigslist Blackshear Ga
Immortal Ink Waxahachie
Khiara Keating: Manchester City and England goalkeeper convinced WSL silverware is on the horizon
Wgu Academy Phone Number
Mc Donald's Bruck - Fast-Food-Restaurant
Why do rebates take so long to process?
Optum Urgent Care - Nutley Photos
Air Quality Index Endicott Ny
Gazette Obituary Colorado Springs
Apartments / Housing For Rent near Lake Placid, FL - craigslist
Plost Dental
Sound Of Freedom Showtimes Near Movie Tavern Brookfield Square
Mta Bus Forums
Nk 1399
Shoe Station Store Locator
Stouffville Tribune (Stouffville, ON), March 27, 1947, p. 1
Donald Trump Assassination Gold Coin JD Vance USA Flag President FIGHT CIA FBI • $11.73
Covalen hiring Ai Annotator - Dutch , Finnish, Japanese , Polish , Swedish in Dublin, County Dublin, Ireland | LinkedIn
THE 10 BEST Yoga Retreats in Konstanz for September 2024
Heavenly Delusion Gif
Space Marine 2 Error Code 4: Connection Lost [Solved]
Gets Less Antsy Crossword Clue
Body Surface Area (BSA) Calculator
Emulating Web Browser in a Dedicated Intermediary Box
Lucifer Morningstar Wiki
Panolian Batesville Ms Obituaries 2022
About Us
Wzzm Weather Forecast
Razor Edge Gotti Pitbull Price
Tommy Gold Lpsg
Twizzlers Strawberry - 6 x 70 gram | bol
Immobiliare di Felice| Appartamento | Appartamento in vendita Porto San
How to Get a Check Stub From Money Network
San Pedro Sula To Miami Google Flights
Fishing Hook Memorial Tattoo
Latest Posts
Article information

Author: Kerri Lueilwitz

Last Updated:

Views: 6096

Rating: 4.7 / 5 (67 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Kerri Lueilwitz

Birthday: 1992-10-31

Address: Suite 878 3699 Chantelle Roads, Colebury, NC 68599

Phone: +6111989609516

Job: Chief Farming Manager

Hobby: Mycology, Stone skipping, Dowsing, Whittling, Taxidermy, Sand art, Roller skating

Introduction: My name is Kerri Lueilwitz, I am a courageous, gentle, quaint, thankful, outstanding, brave, vast person who loves writing and wants to share my knowledge and understanding with you.