Resurrection Of Hacking!

-So This is Hacking is all about .Before exploiting(attacking) any system; One should know how to -:

  1. PREPARE
  2. INITIATE
  3. LAUNCH
  4. WIPE THE FOOTPRINTS

Basically any cyber attack(hacking) is divided into 5 main phases i.e:-

Phase 1 | Reconnaissance
Reconnaissance is the act of gathering preliminary data or intelligence on your target. The data is gathered in order to better plan for your attack.This is most important and vital phase of hacking as it can take years to knowing  your target.This helps us to build the strategy how the attack going to took place.Knowing the  target vulnerablities helps us to chose our type of exploits.Reconnaissance can be performed actively (meaning that you are directly touching the target) or passively (meaning that your recon is being performed through an intermediary).

Phase 2 | Scanning

Okay cool now we know our target so now we need to vulernabilities.
The phase of scanning requires the application of technical tools to gather further intelligence on your target, but in this case, the intel being sought is more commonly about the systems that they have in place. A good example would be the use of a vulnerability scanner on a target network.

Phase 3 | Gaining Access

Its high time…Its time to hit.ATTACKING THE SYSTEM and gaining access requires taking control of one or more network devices in order to either extract data from the target, or to use that device to then launch attacks on other targets.

Phase 4 | Maintaining Access

Now I AM ROBOT now we have the access to system now we strengthen the hold.
Maintaining access requires taking the steps involved in being able to be persistently within the target environment in order to gather as much data as possible. The attacker must remain stealthy in this phase, so as to not get caught while using the host environment and doing our job.

Phase 5 | Covering Tracks
The final phase of covering tracks simply means that the attacker must take the steps necessary to remove all semblance of detection. Yes you are right my friend this is very very important a good hacker shoudl allways clear his traces so even if victim comes to know about the attack he cant trace the attacker.Any changes that were made, authorizations that were escalated etc. all must return to a state of non-recognition by the host network’s administrators.

PLEASE DO PROVIDE ME YOUR FEEDBACK AND SUGGESTIONS!tHANKS FOR SUPPORT!

Hail HACKING!

ADIOS

By:

Posted in:


Leave a comment