Ethical Hacking - Process

In the process of hacking there are 5 phases involved.

Reconnaissance

Reconnaissance means to collect information without interacting with victim. It involves collecting information from public records, social networking sites, etc.

Scanning

Next comes Scanning the system.Scanning also means to collect information but active information.For eg. Pinging on the system, checking the ports, services, etc.

Reconnaissance

Gaining Access

Then according to information gathered from the above two phases, we plan and implement our attack.

Maintaining Access

After gaining the access, the next step is to maintain the access.It’s very important so that if the victim even switch off or restart the system, connection is not lost. So, it's necessary to migrate the process or create a backdoor to maintain the access using different techniques.After gaining the access, the next step is to maintain the access.It’s very important so that if the victim even switch off or restart the system, connection is not lost. So, it's necessary to migrate the process or create a backdoor to maintain the access using different techniques.Reconnaissance means to collect information without interacting with victim. It involves collecting information from public records, social networking sites, etc.

Clearing tracks

The final step is to clean all traces which indicate the attackers presence so that all logs or tracks are cleared as this is an evidence of attacker's presence.