Oops! It appears that you have disabled your Javascript. In order for you to see this page as it is meant to appear, we ask that you please re-enable your Javascript!
3

These are the some important steps taken by hackers


(adsbygoogle = window.adsbygoogle || []).push({});

Information
Gathering: 

First is recognition and foot printing ultimately
can say information gathering that is the first step and very  important
 in hacking. Can anybody tell If you have target and don’t know anything
about that, can you hack??? No, that’s why information gathering is very
important. Means first step is to gather as much information as much we can. So
maybe we find any possibilities. Hacking is not magic And there is no proper
tools. We have to work on vulnerabilities and bugs.
2.
Scanning:  

(adsbygoogle = window.adsbygoogle || []).push({});


In information gathering, we find all public records which already
in public. In this step you want to gather more deep information. Scanning
involves steps such as intelligent
System
port scanning, which is used to determine open ports and vulnerable services
 After
that gaining access. Suppose we found vulnerability. We say Wow, I got
vulnerability now want to exploit that vulnerability. Gaining access is nothing
but
Owning
the  target system.
 3.
Maintaining Access and Placing Backdoors:-
Suppose
you find a vulnerability in Google, Google will not keep the vulnerability for
a long time. So what you  have to do to make it attack for a long time???
We have to put some backdoors so whenever we want we can assess that thing.
That is nothing but called maintain access.
4.
Clearing Tracks:

What is
the main identity revealed when you are browsing the internet??? IP address?
There
are 3 main identities that can rival or path  1. The IP address 2nd thing
is much address and one more thing, is there. That is a very important thing
your browser itself. Your browser, revealing what system you are using.These
three things how can we hide ourself and be anonymous.
Now the
last step is clearing tracks.: if anything about you is registered then how
will you clear your records so they can’t trace you back.
So
these are the five important phases of the hacking. A lot of guys from school’s
and colleges. They don’t follow the proper steps.What they do they find a
vulnerability and exit it.And after some times logs find on a server they
easily get traced.After that they are behind the worse. So Be anonymous before
doing the hacking.!

The following two tabs change content below.
Ravindra Solanki is a Software Developer, currently working as full stack developer across multiple frameworks and technologies.He likes to experiment new technology stuff, and once successful like to share his knowledge with others.Ravindra is passionate about building products including software and systems.

Latest posts by Ravindra Solanki (see all)

Click Here to Leave a Comment Below 3 comments