Steps Taken By Hackers.

 Hey, Guys Today we will Discuss about some important steps Performed by hackers.


If you are the person who is interested in Hacking and technology then you must have to know about the steps which is taken by the hackers to perform hacking successfully.


The steps are:-

1. Reconnaissance.

2. Scanning.

3. Gaining Access.

4. Maintaining Access.

5. Clearing Tracks.


Phase 1 : Reconnaissance:-


Reconnaissance is the first phase of hacking and this can also described as pre attack phase.

This is a systematic attempt to locate, gather, identify, and record information about the target.

In this hacker seeks to find out every single information as possible about the Target.


Phase 2 : Scanning and Enumeration:-


Scanning and Enumeration is the second phase of hacking and this can also be considered as the second pre attack phase.

In this phase hackers examin the network by the help of information discovered during Reconnaissance.


Phase 3 : Gaining Access:-


This is the phase in which the real hacking takes place. All the vulnerabilities discovered during Phase 1 and 2 are now exploited to gain access.

The method of connection by the hacker use for the exploitation of a device or people can be a local area network, local access to a PC, the internet or offline.

Gaining access to any computer network or device is known as owning the system.

In this stage during a real security breach Hacker can utilize techniques to cause damage to the target system.


Phase 4 : Maintaining Access and Placing Backdoors:-


Once a hacker hack any system, they want to keep the whole access for future exploitation and attacks. Sometimes they also harden the computer system by securing there exclusive access with Bakdoors, Root kits, and Trojans.

Hacker can also use automated scripts and automated tools for hiding attack evidence.


Phase 5 : Clearing Tracks:-


This is the last and the most important phase of any hacker. In this once hacker have able to gain and maintain access, they cover their path of hacking so that they avoid detection by security agencies, Or to avoid legal actions. 

At present there are many successful security breaches are made but most of them never detected till now.



So, This are some the important steps which is taken by any hacker. 

If any of the given steps not done by hacker then we cannot say that hack as a successful hack.

Hacking is all abouit practising daily. If you are practising daily and also use your creatiivity then you will also become a successful hacker.


For more updates must follow my Blog. 

Comments

Popular posts from this blog

C-programming Introduction (Notes).

My Resume / Achievements.

All about hacking.