Steps Performed by Hackers
1.
Reconnaissance
2.
Scanning
3.
Gaining access
4.
Maintaining access
5.
Clearing tracks
·
Performing reconnaissance
·
Scanning and enumeration
·
Gaining access
·
Maintain access and placing back doors
·
Covering tracks or clearing logs
Phase 1:
reconnaissance
Ø
Reconnaissance can be described as the
pre-attack phase and is a systematic attempt to locate, gather, identify, and
record information about the target. The hacker seeks to find out as much
information as possible about the target.
Phase 2: scanning and enumeration
Scanning and enumeration is considered the second
pre-attack phase. This phase and is a systematic attempt to locate, gather,
identify, and record information about the hacker seeks to find out as much
information as possible about the target
Phase 3: gaining access
This is the phase where the real hacking takes place.
Vulnerabilities discovered during the reconnaissance and scanning phase are now
exploited to gain access. The method of connection the hacker uses for an
exploit can be a local area network, local access to a PC, the internet, or
offline. Gaining access is known in the hacker world as owning the systems.
During real security breach it would be this stage where the hacker can utilize
simple techniques to cause irreparable damage to the target system.
Phase 4: maintaining access and placing backdoors
Once a hacker has gained access, they want to keep that
access for future exploitation and attacks. Sometimes, hackers harden the
system from other hackers or security personnel by securing their exclusive
access with backdoors, root kits, and Trojans.
The attacker can use automated scripts and automated
tools for hiding attack evidence and also to create backdoors for further
attack
Phase 5: clearing tracks
In this phase, once hackers have been able to gain and
maintain access, they cover their tracks to avoid detection by security
personnel, to continue to use the owned system, to remove evidence of hacking,
or to avoid legal action. At present, many successful security breaches are
made but never detected. This includes cases where firewalls and vigilant log
checking were in place.

No comments:
Post a Comment