1. 1
R1econnaissance
2. Scanni1
2.
Scanning11.
3. Gaining Access
4. Maintaining Access
5. Clearing Tracks
ng
3. Gaining Access
4. Maintaining Access
5. Clearing Tracks
2. Scanni1
1. STEPS PERFORMED BY HACKER :
1.Reconnaissance
2.Scanning
3.Ganing Access
4.Maintaining Access
5.Clearing Logs
RECONNAISSANCE:
It can describe as pre-attack phase and is systmatic attempt to laocate,gather,identify and record information about target.
SCANNING:
Scanning and enumration is considered as second pre-attack phase.this phase involves taking the information discovered during reconnaissance and using it to examine the network.In this step port scanning is done to determine open ports and vlurnable services.in this stage attacker can use different tools to discover system vulnerabilities.
GAINING ACCESS:
This is place where real hacking takes place.Vulnerabilites discovered during reconnaissance ans scanning are now exploited to gain access.The method of connection the hacker uses for an exploit can be local area network, local access to PC ,Internet or offline.
MAINTAINING ACCESS:
1.Once a hacker has gain access they want to keep that access for future exploitation and attacks.Hacker harden the system from other hackers or security personnel by securing their exclusive access with backdoors, root kits and trojans.
2.The attacker can use automated script s and automated tools for hiding attack evidence and also to create backdoors for future attacks.
CLEARING LOGS:
In this phase once a hacker have been able to gain and maintain access,they cover their attacks to avoid detection by security personnel, to continue to use thier owned system,to remove evidence of hacking or to avoid legal action.
FREELY AVAILABLE RESOURCES IN HIS ATTACK.
Websits:
1.who.is
2.whois.net
Tools:
1.nmap
2.netsparker
3.nettools
4.acunetics
FREELY AVAILABLE RESOURCES IN HIS ATTACK.
Websits:
1.who.is
2.whois.net
Tools:
1.nmap
2.netsparker
3.nettools
4.acunetics
3. Gaining Access
4. Maintaining Access
5. Clearing Tracks
ng
3. Gaining Access
4. Maintaining Access
5. Clearing Tracks
No comments:
Post a Comment