Hacking For Beginners – Manthan Desai
Phase IV: Maintaining Access and Placing Backdoors
2010
Once a Hacker has gained access, they want to keep that access for future exploitation and attacks. Sometimes,Hackers harden the system from other Hackers or security personnel by securing their exclusive access withBackdoors, Root kits, and Trojans.
The attacker can use automated scripts and automated tools for hiding attack evidence and also to createbackdoors for further attack.
Phase V: Clearing Tracks
In this phase, once Hackers have been able to gain and maintain access, they cover their tracks to avoid detectionby security personnel, to continue to use the owned system, to remove evidence of hacking, avoid legalaction. At present, many successful security breaches are made but never detected. This cases wherefirewalls and vigilant log checking were in place.
Working of an ethical hacker
bad things can happen. Most of the timeethical hacking tests. The results are even
The word ethical can be defined as working with high professional morals and principles. Whether you’reperforming ethical hacking tests against your own systems or for someone who has hired you, everything you doas an ethical Hacker must be approved and must support the company’s goals. No hidden agendas are allowed!Trustworthiness is the ultimate objective. The misuse of information is absolutely not allowed. That’s what the
Treat the information you gather with complete respect. All information you obtain during your testing — fromWeb application log files to clear-text passwords — must be kept private.
Not crashing your systems:
One of the biggest mistakes is when people try to hack their own systems; they come up with crashing theirsystems. The main reason for this is poor planning. These testers have not read the documentation ormisunderstand the usage and power of the security tools and techniques.
You can easily create miserable conditions on your systems when testing. Running too many tests too quickly on asystem causes many system lockups. Many security assessment tools can control how many tests are performedon a system at the same time. These tools are especially handy if you need to run the tests on production systemsduring regular business hours.
Executing the plan:
In Ethical hacking, Time and patience are important. Be careful when you’re performing your ethical hacking tests.A Hacker in your network or an employee looking over your shoulder may watch what’s going on. This person
www.hackingtech.co.tv
Page 17