Published Sep 12, 2021
2 mins read
454 words
This blog has been marked as read.
Read more
Technology
Science
Blogging

Ethical Hacking - A Complete Process [Part 4 ]

Published Sep 12, 2021
2 mins read
454 words

Happy Sunday people ! Welcome back to my ethical hacking series . So , we have been learning about the basics of ethical hacking and about their  phases in the previous blogs .In this blog i will brief about the remaining phases . Let's see what is it .

The Second phase : Scanning 

After the reconnaissance module , the attackers start to search for an entry point into the target system . Scanning is the process of gathering additional detailed information about the target by using highly complex and reconnaissance techniques . I have explained detailly about the network scanning in the previous blog .

The third phase : Gaining access 

This is the place where the actual hacking takes place . The hacker uses all the information gathered about the target by the previous two phases to execute a full-fledged attack on the opposite network .He exploits all the known vulnerabilities there by gaining access of the system he hacked . There are many options to execute the attack . Some of them are ;

  • Phishing attack
  • Brute force attack
  • Main in the middle attack
  • DOS attack
  • Buffer overflow attack
  • Spoofing attack
  • BEC attack
  • Session hijacking

Once after entering the attack the hacker can collect all the required data , can corrupt the systems and also can add viruses to manipulate the system .

The fourth phase : Maintaining access

This part is also an important one in the process of hacking . Ok, the hacker collects the details about the target and finally he get access to the system . Then what , the hacker has to get all the required details for that he has to maintain the access until he finishes the job . So tracking and hacking the system is not going to be enough .The hacker secures access to the organization's Trojans and Rootkits to establish some additional attacks on the network.

The fifth phase : Clearing tracks 

The last  effective step to complete the whole ethical hacking process .After gaining access and manipulating the network , the hacker has to erase or remove the trace of these process leaving without a zero doubt to the target that his system has been hacked . The security system in that place should not detect the hacker's entry or leaving .  They have to cause as much as damage to target's system according to the plan and manage to leave the network without leaving a trace . The security system never realizing that a hacking has been executed in their system is the victory sign of a perfect ethical hacking . 

So guys , this is the end to ethical hacking series . I believe that this series must have some how given you guys an idea of ethical hacking and how it's done . Hope you all found it interesting .

Thanks for reading guys !πŸ’™

#hacking
#ethical
#phases
#target
#attacking
44
8
2k_queen 9/12/21, 11:35 AM
1
Good one
1
m.cube 9/12/21, 4:19 PM
1
Well written πŸ™‚ keep going Check mine too. Follow for a definite follow back
1
gang.scholars 9/12/21, 4:48 PM
1
This makes me want to become a hacker😎. Amazing blog!
1
thegirlwithsensation 9/13/21, 9:21 AM
Good one. #monkhood
asadmirza1997 9/13/21, 11:42 AM
πŸ‘πŸ‘πŸ‘πŸ‘
senthil_kumar 9/16/21, 6:45 AM
interesting blog
mreeduban.goswami 10/18/21, 3:14 PM
Nice oneπŸ‘πŸ»
harikatammina 10/19/21, 2:58 AM
Attractive Do read mine too

Candlemonk | Earn By Blogging | The Bloggers Social Network | Gamified Blogging Platform

Candlemonk is a reward-driven, gamified writing and blogging platform. Blog your ideas, thoughts, knowledge and stories. Candlemonk takes your words to a bigger audience around the globe, builds a follower base for you and aids in getting the recognition and appreciation you deserve. Monetize your words and earn from your passion to write.