There are five phases in Hacking they are:
Reconnaissance <> Scanning <> Gaining Access <> Maintaining Access <> Clearing Tracks
Reconnaissance <> Scanning <> Gaining Access <> Maintaining Access <> Clearing Tracks
Reconnaissance:
- Reconnaissance refers to the preparatory phase where an attacker seeks to gather information about a target prior to launching an attack
- Reconnaissance could be the future point of return, noted for ease of entry for an attack when more about the target is known on a board scale
- Reconnaissance target range may include the target organization's clients, employees, operations, network, and systems
Reconnaissance are of two types:
- Active Reconnaissance
- Passive Reconnaissance
Active Reconnaissance
- Active reconnaissance involves interacting with the target directly by any means
- For example, telephone calls to the help desk or technical department
Passive Reconnaissance
- Passive Reconnaissance involves acquiring information without directly interacting with the target
- For example, searching public records or news releases
Scanning:
- Pre-Attack Phase
Scanning refers to the pre-attack phase when attacker scans the network for specific information on the basis of information gathered during reconnaissance
- Port Scanning
Scanning can includeuse of dailers, port scanners, network mappers, ping tools, vulnerability scanners, etc.
- Extract Information
Attackers extract information such as live machine, port, port status, OS details, device type, system uptime, etc. to launch attack
Gaining Access:
- Gaining access refers to the point where the attacker obtains access to the operating system or applications on the computer or network
- The attacker can gain access at the operating system level, application level, or network level
- The attacker can escalate privileges to obtain compete control of the systems. In this process, intermediate systems that are connected to it are also compromised
- Examples include password cracking, buffer overflows, denail of service, session hijacking, etc.
Maintaining Access:
- Maintaining access refers to the phase when attacker tries to retain his or her ownership of the system
- Attacker may present the system from being owned by other attackers by securing their exclusive access with Backdoors, RootKits, or Trojans.
- Attackers can upload, download, or manipulate data, applications, and configuration on the owned system
- Attackers use the compromised system to launch further attacks
Clearing Tracks:
- Hiding
Covering tracks refers to the activities carried out by an attacker to hide malicious attacks
- Intentions
The attacker's intentions include:
- Continuing access to the victims system
- Remaining unnoticed and uncaught
- Deleting evidence that might lead to his prosecution
- Overwriting
The attacker overwrites the server, system,and application logs to avoid suspicion
No comments:
Post a Comment