Tuesday, 26 March 2013

Steps performed by hacker to attack the target

1. 1     R1econnaissance
2.      Scanni1
1.     STEPS PERFORMED BY HACKER :

     1.Reconnaissance
     2.Scanning
     3.Ganing Access
     4.Maintaining Access
     5.Clearing Logs 


RECONNAISSANCE:
It can describe as pre-attack phase and is systmatic attempt to laocate,gather,identify and record             information about target.


SCANNING:
Scanning and enumration is considered as second pre-attack  phase.this phase involves taking the information discovered during reconnaissance and using it to examine the network.In this step port scanning is done to determine open ports and vlurnable services.in this stage attacker can use different tools to discover system vulnerabilities.


GAINING ACCESS:
This is place where real hacking takes place.Vulnerabilites discovered during reconnaissance ans scanning are now exploited to gain access.The method of connection the hacker uses for an exploit can be local area network, local access to PC ,Internet or offline.


MAINTAINING ACCESS:
1.Once a hacker has gain access they want to keep that access for future exploitation and attacks.Hacker harden the system from other hackers or security personnel by securing their exclusive access with backdoors, root kits and trojans.
2.The attacker can use automated script s and automated tools for hiding attack evidence and also to create backdoors for future attacks.


CLEARING LOGS:
In this phase once a hacker have been able to gain and  maintain access,they cover their attacks to avoid detection by security personnel, to continue to use thier owned system,to remove  evidence of hacking or to avoid legal action.



FREELY AVAILABLE RESOURCES IN HIS ATTACK.

Websits:
1.who.is
2.whois.net 
 Tools:
1.nmap
2.netsparker
3.nettools
4.acunetics

2.      Scanning11.
3.      Gaining Access
4.      Maintaining Access
5.      Clearing Tracks
ng
3.      Gaining Access
4.      Maintaining Access
5.      Clearing Tracks

No comments: