what are phases of hacking 2020?
Hi, their friends welcome to our fresh article
in these posts I gonna tell you about very important in hacking the phases of hacking you will know how you can implement in your hacking skills if your learning hacking.
but before we start describer is very important.
friends but to understand that phases of hacking you have to create a situation that is you are a military any commander and any unknown attacker are attacks on the indivisible building and now you have created this situation in mind and then we can start so now
1. RECONNAISSANCE
RECONNAISSANCE is phases of ethical hacking where the hacker collects information about the targeted network or application that he is trying to hack.
RECONNAISSANCE TOOLS
# search engine
# Ns lookup
# who is lookup
RECONNAISSANCE IMPORTANT TERMS
# IP address
# ip address range
# network
# dns records
2.SCANNING
Scanning is the procedure of identifying a point on the target system network that a hacker can try to hack.
SCANNING TOOLS
# OPEN VAS
# NIKTO
# WIRESHARK
# NESSES
SCANNING OF IMPORTANT TERMS
# ACTIVE PORTS
# ACTIVE HOTS
# SERVICES
# VUERABLE APPLICATION
# OPERATING SYSTEMS
3.EXPLOITATION
EXploitation is the step where hackers advantage of the weakness or loopholes of the targets and hacks it.
EXPLOITATION
SELECT ATTACK
LAUNCH THE ATTACK
GRAIN ACCESS
TOOLS
# BEEF
# METASPOLIT
# SQL MAP
4.MAINTAINING ACCESS
maintaining access in this phase the hackers install software or makes changes on the target such that he can access the targeted later in time.
MAINTAINING TOOLS
# BACK DOORS
# CREATE NEW USER
# ESCALATE PRIVILGES
# ROOT KITS
# TROJANS
#POWERSPLOIT
#WE EVLY
# DNS2 TCP
5. COVERING TRACKS
covering tracks this phase is all about covering the identity of the hackers and the way the exploit has happened.
COVERING TRACKS TRICKS
# CLEAR CACHES /COOKIES
# CLOSE PORTS STOP
# SERVICES
# TEMPERING LOG FILES.
*friends tell me in the comments section what do you think about hacking and do you want to learn to hack *
*if you like this article and tell me in the comment section and ask your question and i will give you answer to your questions and share this post with your friends and get more article like this*
*Next article will be more information something new something inventive *
|
Hi, their friends welcome to our fresh article
in these posts I gonna tell you about very important in hacking the phases of hacking you will know how you can implement in your hacking skills if your learning hacking.
but before we start describer is very important.
*This article is only for education purpose please try this is good way*The phases of hacking are basically 5 important points and what is that point let's start.
friends but to understand that phases of hacking you have to create a situation that is you are a military any commander and any unknown attacker are attacks on the indivisible building and now you have created this situation in mind and then we can start so now
1. RECONNAISSANCE
RECONNAISSANCE is phases of ethical hacking where the hacker collects information about the targeted network or application that he is trying to hack.
RECONNAISSANCE TOOLS
# search engine
# Ns lookup
# who is lookup
RECONNAISSANCE IMPORTANT TERMS
# IP address
# ip address range
# network
# dns records
2.SCANNING
Scanning is the procedure of identifying a point on the target system network that a hacker can try to hack.
SCANNING TOOLS
# OPEN VAS
# NIKTO
# WIRESHARK
# NESSES
SCANNING OF IMPORTANT TERMS
# ACTIVE PORTS
# ACTIVE HOTS
# SERVICES
# VUERABLE APPLICATION
# OPERATING SYSTEMS
3.EXPLOITATION
EXploitation is the step where hackers advantage of the weakness or loopholes of the targets and hacks it.
EXPLOITATION
SELECT ATTACK
LAUNCH THE ATTACK
GRAIN ACCESS
TOOLS
# BEEF
# METASPOLIT
# SQL MAP
4.MAINTAINING ACCESS
maintaining access in this phase the hackers install software or makes changes on the target such that he can access the targeted later in time.
MAINTAINING TOOLS
# BACK DOORS
# CREATE NEW USER
# ESCALATE PRIVILGES
# ROOT KITS
# TROJANS
#POWERSPLOIT
#WE EVLY
# DNS2 TCP
5. COVERING TRACKS
covering tracks this phase is all about covering the identity of the hackers and the way the exploit has happened.
COVERING TRACKS TRICKS
# CLEAR CACHES /COOKIES
# CLOSE PORTS STOP
# SERVICES
# TEMPERING LOG FILES.
*friends tell me in the comments section what do you think about hacking and do you want to learn to hack *
*if you like this article and tell me in the comment section and ask your question and i will give you answer to your questions and share this post with your friends and get more article like this*
*Next article will be more information something new something inventive *
*The education is something that you keeps for hole life*
1 Comments
Good sir
ReplyDeletethank you we are very happy you are a comment on us because for us your every single comment is important for us.