Steps Involved In Hacking

As mentioned earlier ethical hacker takes same steps as malicious hacker. Following are different steps that are performed during hacking.
1.Reconnaissance:
This step involves gathering potential information about target system. In fact hacker spends 90% of time for this phase only and next 10% time for rest of the steps.
2.Scanning:
During this phase network is scanned for vulnerability.
3.Gaining Access:
This is the step where real hacking takes place. Hacker takes advantage of vulnerability found in scanning phase and penetrates the victim system.
4.Maintaining Access:
After gaining access hacker makes provision to come back by planting root-kit and backdoor.
5.Covering Tracks:
In this phase hacker removes all traces of his/her presence in system by removing log files and event logs.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s