Happy Sunday people ! Welcome back to my ethical hacking series . So , we have been learning about the basics of ethical hacking and about their phases in the previous blogs .In this blog i will brief about the remaining phases . Let's see what is it .
The Second phase : Scanning
After the reconnaissance module , the attackers start to search for an entry point into the target system . Scanning is the process of gathering additional detailed information about the target by using highly complex and reconnaissance techniques . I have explained detailly about the network scanning in the previous blog .
The third phase : Gaining access
This is the place where the actual hacking takes place . The hacker uses all the information gathered about the target by the previous two phases to execute a full-fledged attack on the opposite network .He exploits all the known vulnerabilities there by gaining access of the system he hacked . There are many options to execute the attack . Some of them are ;
Once after entering the attack the hacker can collect all the required data , can corrupt the systems and also can add viruses to manipulate the system .
The fourth phase : Maintaining access
This part is also an important one in the process of hacking . Ok, the hacker collects the details about the target and finally he get access to the system . Then what , the hacker has to get all the required details for that he has to maintain the access until he finishes the job . So tracking and hacking the system is not going to be enough .The hacker secures access to the organization's Trojans and Rootkits to establish some additional attacks on the network.
The fifth phase : Clearing tracks
The last effective step to complete the whole ethical hacking process .After gaining access and manipulating the network , the hacker has to erase or remove the trace of these process leaving without a zero doubt to the target that his system has been hacked . The security system in that place should not detect the hacker's entry or leaving . They have to cause as much as damage to target's system according to the plan and manage to leave the network without leaving a trace . The security system never realizing that a hacking has been executed in their system is the victory sign of a perfect ethical hacking .
So guys , this is the end to ethical hacking series . I believe that this series must have some how given you guys an idea of ethical hacking and how it's done . Hope you all found it interesting .
Thanks for reading guys !π