what are phases of hacking 2020?

phases of hacking

Hi, their friends welcome to our fresh article 

in these posts I gonna tell you about very important in hacking the phases of hacking you will know how you can implement in your hacking skills if your learning hacking.
but before we start describer is very important.


*This article is only for education purpose please try this is good way*
The phases of hacking are basically 5 important points and what is that point let's start.

friends but to understand that phases of hacking you have to create a situation that is you are a military any commander and any unknown attacker are attacks on the indivisible building and now you have created this situation in mind and then we can start so now 


1. RECONNAISSANCE

RECONNAISSANCE is phases of ethical hacking where the hacker collects information about the targeted network or application that he is trying to hack.

RECONNAISSANCE TOOLS 

# search engine 
# Ns lookup
# who is lookup

RECONNAISSANCE IMPORTANT TERMS

# IP address 
# ip address range 
# network 
# dns records


2.SCANNING

Scanning is the procedure of identifying a point on the target system network that a hacker can try to hack.

SCANNING TOOLS 

# OPEN VAS 
# NIKTO
# WIRESHARK
# NESSES

SCANNING OF IMPORTANT TERMS

# ACTIVE PORTS 

# ACTIVE HOTS 
# SERVICES 
# VUERABLE APPLICATION
# OPERATING SYSTEMS 

3.EXPLOITATION

EXploitation is the step where hackers advantage of the weakness or loopholes of the targets and hacks it.


EXPLOITATION 

SELECT ATTACK

LAUNCH THE ATTACK 

GRAIN ACCESS 

TOOLS

# BEEF
# METASPOLIT
# SQL MAP


4.MAINTAINING ACCESS

maintaining access in this phase the hackers install software or makes changes on the target such that he can access the targeted later in time.


MAINTAINING TOOLS

# BACK DOORS 
# CREATE NEW USER 
# ESCALATE PRIVILGES
# ROOT KITS
# TROJANS
#POWERSPLOIT
#WE EVLY
# DNS2 TCP


5. COVERING TRACKS

covering tracks this phase is all about covering the identity of the hackers and the way the exploit has happened.


 COVERING TRACKS TRICKS 

# CLEAR CACHES /COOKIES
# CLOSE PORTS STOP
# SERVICES
# TEMPERING LOG FILES.

*friends tell me in the comments section what do you think about hacking and do you want to learn to hack *
*if you like this article and tell me in the comment section and ask your question and i will give you answer to your questions and share this post with your friends and get more article like this*

*Next article will be more information something new something inventive  *
*The education is something that you keeps for hole life*