HERE ARE THE PHASES OF HACKING WHICH HACKER MUST FOLLOW TO IMPLEMENT A SUCCESSFUL ATTACK!
THE MORE YOU GET CLOSE TO ALL PHASES,THE MORE STEALTH WILL BE YOUR YOUR ATTACK
PHASES OF HACKING:
1. RECONNAISSANCE : THIS IS THE PRIMARY PHASE WHERE THE HACKER TRIES TO COLLECT AS MUCH INFORMATION AS POSSIBLE ABOUT THE TARGET. IT INCLUDES IDENTIFYING THE TARGET,FINDING OUT THE TARGET IP ADDRESS RANGE,NETWORK,DOMAIN NAME REGISTRATION RECORDS OF THE TARGET,MAIL SERVER RECORDS,DNS RECORDS ,ETC,ETC…….
2. SCANNING: THIS MAKES UP THE BASE OF HACKING! THIS IS WHERE PLANNING FOR ATTACK ACTUALLY BEGINS! AFTER RECONNAISSANCE THE ATTACKER SCANS THE TARGET FOR SERVICES RUNNING,OPEN PORTS,FIREWALL DETECTION,FINDING OUT VULNERABILITIES,OPERATING SYSTEM DETECTION,ETC…ETC….
3.GAINING ACCESS: AFTER SCANNING,THE HACKERS DESIGNS THE BLUEPRINT OF THE NETWORK OF THE TARGET WITH THE HELP OF STUFFS COLLECTED DURING PHASES 1 AND 2! NOW THE ATTACKER EXECUTES THE ATTACK BASED ON THE VULNERABILITIES WHICH WERE IDENTIFIED DURING SCANNING! AFTER THE SUCCESSFUL ATTACK,HE GETS ACCESS TO THE TARGET NETWORK
4.MAINTAINING ACCESS: AFTER GAINING ACCESS,THE ATTACKER ESCALATES THE PRIVILEGES TO ROOT/ADMIN AND UPLOADS A PIECE OF CODE(USUALLY CALLED AS BACKDOOR) ON THE TARGET NETWORK SO THAT HE ALWAYS MAINTAIN THE GAINED ACCESS AND CAN CONNECT TO TARGET ANYTIME! B)
5.COVERING TRACK: AFTER GAINING ACCESS AND MAINTAINING THE SAME, HACKER EXPLOITS THE WEAKNESS AND HACKS THE NETWORK OR MISUSES THE ACCESS! AFTER THAT, COMES THE IMPORTANT PHASE—> COVERING THE TRACKS! TO AVOID GETTING TRACED AND CAUGHT,HACKER CLEARS ALL THE TRACKS BY CLEARING ALL KINDS OF LOGS AND DELETED THE UPLOADED BACKDOOR AND ANYTHING RELATED STUFF WHICH MAY LATER REFLECT HIS PRESENCE!
No comments:
Post a Comment