Skip to main content

Steps Performed By hackers

Steps Performed By hackers
1) Reconnaissance
2) Scanning
3) Gaining Access
4) Maintaining Access
5) Clearing Tracks
• Performing Reconnaissance
• Scanning and Enumeration
• Gaining access
• Maintaining access and Placing Backdoors
• Covering tracks or Clearing Logs

Phase I: Reconnaissance
Reconnaissance can be described as the pre-attack phase and is a systematic attempt to locate, gather, identify,
and record information about the target. The Hacker seeks to find out as much information as possible about the
target.

Phase II: Scanning and Enumeration
Scanning and enumeration is considered the second pre-attack phase. This phase involves taking the information
discovered during reconnaissance and using it to examine the network. Scanning involves steps such as intelligent
system port scanning which is used to determine open ports and vulnerable services. In this stage the attacker
can use different automated tools to discover system vulnerabilities.

Phase III: Gaining Access
This is the phase where the real hacking takes place. Vulnerabilities discovered during the reconnaissance and
scanning phase are now exploited to gain access. The method of connection the Hacker uses for an exploit can be
a local area network, local access to a PC, the Internet, or offline. Gaining access is known in the Hacker world as
owning the system. During a real security breach it would be this stage where the Hacker can utilize simple
techniques to cause irreparable damage to the target system.

Phase IV: Maintaining Access and Placing Backdoors
Once a Hacker has gained access, they want to keep that access for future exploitation and attacks. Sometimes,
Hackers harden the system from other Hackers or security personnel by securing their exclusive access with
Backdoors, Root kits, and Trojans.
The attacker can use automated scripts and automated tools for hiding attack evidence and also to create
backdoors for further attack.

Phase V: Clearing Tracks
In this phase, once Hackers have been able to gain and maintain access, they cover their tracks to avoid detection
by security personnel, to continue to use the owned system, to remove evidence of hacking, or to avoid legal
action. At present, many successful security breaches are made but never detected. This includes cases where
firewalls and vigilant log checking were in place.

Comments

Popular posts from this blog

40 easy ways to make money quickly

On this page you'll find all the best ways to make money in your spare time whilst at university based on our own experience. We'll keep adding new ways to this page so go ahead and bookmark it. And please do share your own ideas in the comments! Top ways to make money online and offline No-risk matched betting Hands down the quickest way to make a  lot  of money (well, without breaking the law). Lots of students have genuinely made £100s from this technique. It's completely legal, risk free, tax free, and anyone can do it. It works by taking advantage of free bets regularly offered by betting sites through ‘matching' them at a betting exchange. Matched betting eliminates the risk (you are betting both  for  and  against  a certain outcome). This leaves you being able to squeeze out the free bet, which can be as much as £200! Multiply this by how many betting sites there are and you can quite easily come away with a profit of a few hundred poun...

Funny hot video

There is new funny hot  Video Play now Download Now Play Now Download Now Let's face it. Scaling your business is hard. It takes considerable effort. In the beginning, it means wearing different hats. It means dealing with sales and  marketing . It means understanding  taxes  and corporate compliance. It involves having to interact with customers on a daily basis. And so much more. At the end of the day, it takes its toll on you. If you're struggling to grow your business, there is light at the end of the tunnel. Sure, it's hard. But, what's the alternative? A life-sucking 9-to-5 job? Surely not. Okay, maybe you're longing for the security of a guaranteed paycheck. But, at what mental or emotional price will that come? The truth? If you buckle down, clear your mind, and just look at things in perspective, you can easily identify ways you can grow your business and  make more  money  quickly. While hundreds of business  gr...