Header Ads

  • Breaking News

    Good news ! Good news !! Good news !!! soon you all will be able to download important software in our download section...

    Process or steps involved in hacking


    As if we plan to do anything we need to follow some process or any work will complete in phases like that hacking have some process or phases which you have to follow to hack any system.
    Below are the process or phases......


    Reconnaissance
    Reconnaissance is the phase where the attacker gathers information about a target using active or passive means. The tools that are widely used in this process are NMAP, Hping, Maltego, and Google Dorks.
    Scanning
    In this process, the attacker begins to actively probe a target machine or network for vulnerabilities that can be exploited. The tools used in this process are Nessus, Nexpose, and NMAP.
    Gaining Access
    In this process, the vulnerability is located and you attempt to exploit it in order to enter into the system. The primary tool that is used in this process is Metasploit.
    Maintaining Access
    It is the process where the hacker has already gained access into a system. After gaining access, the hacker installs some backdoors in order to enter into the system when he needs access in this owned system in future. Metasploit is the preferred tool in this process.
    Clearing Tracks
    This process is actually an unethical activity. It has to do with the deletion of logs of all the activities that take place during the hacking process.
    Reporting
    Reporting is the last step of finishing the ethical hacking process. Here the Ethical Hacker compiles a report with his findings and the job that was done such as the tools used, the success rate, vulnerabilities found, and the exploit processes.
    Punch Line: 
    The processes are not standard. You can adopt a set of different processes and tools according to your techniques that you are comfortable with. The process is of least significance as long as you are able to get the desired results.

    Post Top Ad

    image name

    Post Bottom Ad

    imagename