Hacking For Beginners – Manthan Desai
2010
That’s not the best approach to information security. What’s important is to protect your systems from knownVulnerabilities and common Hacker attacks.
It’s impossible to overcome all possible vulnerabilities of your systems. You can’t plan for all possible attacks —especially the ones that are currently unknown which are called Zero Day Exploits. These are the attacks whichare not known to the world. However in Ethical Hacking, the more combinations you try — the more you testwhole systems instead of individual units — the better your chances of discovering vulnerabilities.
Steps Performed By hackers
1) Reconnaissance
2) Scanning
3) Gaining Access
4) Maintaining Access
5) Clearing Tracks
• Performing Reconnaissance
• Scanning and Enumeration
• Gaining access
• Maintaining access and Placing Backdoors
• Covering tracks or Clearing Logs
Reconnaissance can be described as the pre-attack phase and is a systematic attempt to locate, gather, identify,and record information about the target. The Hacker seeks to find out as much information as possible about thetarget.
Phase II: Scanning and Enumeration
Scanning and enumeration is considered the second pre-attack phase. This phase involves taking the informationdiscovered during reconnaissance and using it to examine the network. Scanning involves steps such as intelligentsystem port scanning which is used to determine open ports and vulnerable services. In this stage the attackercan use different automated tools to discover system vulnerabilities.
Phase III: Gaining Access
This is the phase where the real hacking takes place. Vulnerabilities discovered during the reconnaissance andscanning phase are now exploited to gain access. The method of connection the Hacker uses for an exploit can bea local area network, local access to a PC, the Internet, or offline. Gaining access is known in the Hacker world asowning the system. During a real security breach it would be this stage where the Hacker can utilize simpletechniques to cause irreparable damage to the target system.
www.hackingtech.co.tv
Page 16