Ethical Hacking Process/5 Phases Of Ethical Hacking
In the process of hacking there are 5 phases involved.
Reconnaissance :
Reconnaissance means to collect information without interacting with victim. It involves collecting information from public records, social networking sites, etc.
Scanning :
Next comes Scanning the system.Scanning also means to collect information but active information.For eg. Pinging on the system, checking the ports, services, etc.
Gaining Access :
Then according to information gathered from the above two phases, we plan and implement our attack.
Maintaining Access :
After gaining the access, the next step is to maintain the access.It’s very important so that if the victim even switch off or restart the system, connection is not lost. So, it's necessary to migrate the process or create a backdoor to maintain the access using different techniques.After gaining the access, the next step is to maintain the access.It’s very important so that if the victim even switch off or restart the system, connection is not lost. So, it's necessary to migrate the process or create a backdoor to maintain the access using different techniques.Reconnaissance means to collect information without interacting with victim. It involves collecting information from public records, social networking sites, etc.
Clearing tracks :
The final step is to clean all traces which indicate the attackers presence so that all logs or tracks are cleared as this is an evidence of attacker's presence.