Home WikHack - Read About Hacking The Five phases of hacking process

The Five phases of hacking process

Advertisment


Latest Post

Forensic Malayalam Full HD Movie Download Torrent, Tamilrockers 2020

Forensic Malayalam Full HD Movie Download Leaked By Torrent, Tamilrockers 2020 Forensic Malayalam Movie :- This is a Latest Malayalam Movie. Directed By Akhil...

Ik Sandhu Hunda Si Punjabi Full HD Movie Download Torrent, Tamilrockers 2020

Ik Sandhu Hunda Si Punjabi Full HD Movie Download Torrent, Tamilrockers 2020 This is a Latest Punjabi Language Movie. Film Directed By Rakesh Mehta And...

Download Thappad Full HD Movie (Taapsee) 2020 Torrent & Tamilrockers

Download Thappad Full HD Movie (Taapsee) 2020 Torrent & Tamilrockers Thappad Movie Download:- Thappad is a story of a woman who decides to stand up...

Latest News

Air Pollution in Delhi : Heavy Fog in Delhi [November Latest Updated]

Air Pollution in Delhi I live in the world's most polluted city. I wish I could show you where I live but only if...

FASTag – What is fastag & how to get fastag for vehicles

FASTag - What Is Fastag & How To Get Fastag for vehicles What Is FASTag :-  FASTag is a toll-taking technique. Electronic toll collection system...

LuvUTurn Movie | Review, Trailer, Cast, Songs And More

About LuvUTurn Movie Recently launched love you turn movie trailer. People love the trailer too People are eagerly waiting for the movie now. The story...

Tesla CyberTruck : First Electric Pickup Truck

Cyber Truck : Electric Pickup Truck The company just unveiled it's first electric pickup truck, the Cyber Truck. Now we know Tesla has been working...

Housefull 5 Movie : Akshay Kumar And All Other Couples

Housefull 5 Movie : Akshay Kumar And All Other Couples Housefull Movie director Sajid Nadiadwala is thinking of making Housefull 5 movie. Sajid Nadiadwala's Housefull...

Haaye Ve Song 2019 Download And Play Online

Haaye Ve Song 2019 Download And Play Online Haaye Ve Song. Haaye Ve is a Punjabi Songs. This song is sung by Ammy Virk And Lyrics...

Klolan | Jinde Meriye song [Parmish Verma] 2019 Song Online Play & Download

Klolan | Jinde Meriye song 2019 Song Online Play & Download Klolan song | Jinde Meriye 2019 Song Online Play & Download. Jinde...

Robibaar [Bengali] Full HD Movie Download Leaked By Filmywap

Robibaar Full HD Movie Download Leaked By Filmywap Robibaar is a Bengali Language Movie. This Movie is Leaked by Filmywap. You Can Download This...

The Five phases of hacking process

Phases of Hacking

There are Five(5) stages that form a structured part of the hacking process:
Phase 1-Reconnaissance
Phase 2-Scanning
Phase 3-Gaining Access
Phase 4-Maintaining Access
Phase 5-Covering Tracks
Passive reconnaissance is gathering information about the target we intend to hack. Naturally, this is done without the knowledge of the target system and user. Much like what the military does when they scope out an area they plan to attack. In passive recon the target system is not engaged in any way. Information and intel is collected by simply observing.
Sniffing the network is a way of conducting a passive reconnaissance and can give you very useful intel such as IP address, networks in the area etc. Sniffing is like what a dog does, he sniffs out information on networks. Using sniffing, the hacker studies the system, information and data flow and looks for vulnerabilities within the target network.

Active reconnaissance is when the hacker engages the system and looks for vulnerabilities to enter a network. it involves more risk than conducting a passive recon, since there is high risk of being detected as anfoutsider and intruder and being blocked by the security systems put in place by the target network. Both passive and active reconnaissance is helpful in the discovery of critical initial information on the target system. lP address, kind of 05 at work etc are all information that aid and assist the hacker find vulnerabilities in the network and therefore plan his attack.

Phase 2: Scanning 
Scanning is the stage when all the information that is collected is taken and run through different tools that may be available and examined. The scanning helps the hacker in preparing for his attack. Whether it’s the lP address, type of packets, operating systems in use; all the collected information helps the hacker. The hacker can deploy many tools like Vistumbler, inSSlDer and many others that are available depending on the hackers OS.
Phase 3: Gaining Access 
This is where the hacking actually happens. In phase 1 and 2, the hacker had searched and studied the weaknesses and vulnerabilities of the target network. He will now attempt to use those weaknesses to enter the system. He can use many methods to gain this access to the network, from LAN, local access to the PC, the internet. The hacker will gain entry by authenticating himself with the Access Point. So any data he watches, sends or receives, will appear to have been authenticated by the AP.
Phase 4: Maintaining Access 
The key to hacking does not lie in just entering the system, but also staying there. Whether he uses packet injections to fool the system network or boots another user to replace him, the hacker ensures that he stays in the system. Once he has access to the system, he may want to keep that access going for future use. They could create back doors or Trojans to ensure no other hacker enters the system and can enter and exit the system when they need to.
Phase 5: Covering Tracks 
As is evident from the name itself, hackers like to clean up the place. Like thieves who wipe out any evidence of ever having been there. This is critical, so they can’t be traced or even detected and therefore avoids legal action against them. Steganography permits hackers to conceal information inside image headers and Meta tags that are not obvious. Tunnelling allows hackers to hack through one service that is carried over another service, to increase the difficulty of finding them. A successful attack with maintained access often means continued recon. The more the hacker learns about the system and operations, the more curious he gets and returns to exploit and explore. These five stages are ongoing in a continued loop and format for a hacker who has succeeded in hacking the system.
THE END (The Five phases of hacking process)

Advertisement




Random Post

Action Tamil Movie : Review, Songs, Trailer, Vishal & Tamannah New South Movie

Action Tamil Movie Vishal & Tamannah in Lead Roll Action Movie Trailer & Teaser Recently Launched. The Director of This Film is Sundar C. This...

Download Remember Amnesia Full Hd Movie Leaked By Tamilrockers

Download Remember Amnesia Full Hd Movie Leaked By Tamilrockers Cast :- Mahesh Manjrekar Curtiss Cook Lisa Ann Walter Tovah Feldshuh Dileep Rao Disclaimer :- This website...

Commando 3 Movie,Trailer, Review, Songs- Best Action Movie in 2019

Commando 3 Movie Best Action Movie in 2019 People are eagerly waiting for the Commando 3 movie. Commando movie release date has come out. This...

Dabangg 3 Movie, Songs, Trailer, Review- Blockbuster Movie

Recently The Dabangg 3 Movie Trailer has been Launched People are eagerly waiting for Dabangg 3 movie and why not even Salman Khan who is...

Bigg Boss 13 [Winner is Sidharth Shukla] Announced : India’s Most Popular Shows BB

Colors Bigg Boss 13 For so many days people were eagerly waiting for the winner of Bigg Boss. The winner of BB 13 has...

LuvUTurn Movie | Review, Trailer, Cast, Songs And More

About LuvUTurn Movie Recently launched love you turn movie trailer. People love the trailer too People are eagerly waiting for the movie now. The story...

Housefull 5 Movie : Akshay Kumar And All Other Couples

Housefull 5 Movie : Akshay Kumar And All Other Couples Housefull Movie director Sajid Nadiadwala is thinking of making Housefull 5 movie. Sajid Nadiadwala's Housefull...

Laal Singh Chaddha Movie : Aamir Khan (2020)

Laal Singh Chaddha Movie : Aamir Khan (2020) Aamir Khan has released the first motion poster of his upcoming film 'Lal Singh Chadha'. Sharing it...