Headlines
Loading...
What is hacking | About Hacking | Hacking Concept | Hacking Phases | Types of hacking.

What is hacking | About Hacking | Hacking Concept | Hacking Phases | Types of hacking.

about hacking, what is hacking, Hacking concept
Hackers
Hacker.
      Hacker is a person who is smart enough to steal the information such as personal data, business data, username and passwords and financial information from the system he is unauthorized to get this information by taking unauthorized control over that system using different types of tools and techniques. They can do that for two purposes. One is that, they do illegal thing just for their fun and sometimes they are paid to hack system information.
Hacking.
      The term "Hacking" in the information security refers to exploiting the vulnerabilities in a system, compromising the security to gain an unauthorized access and control over all the resources of system. Hacking may be used for many purposes. It can be used to steal information for any use.
Hacking Phases.
      There are five phases of hacking. These phases are as follows.
1- Reconnaissance
2- Scanning
3- Gaining Access
4- Maintaining Access
5- Clearing Tracks

Reconnaissance.
           It is an initial preparing phase for the attacker to get ready for an attack by collecting data and information about the target or victim before launching an attack using different techniques. Collecting of information is very useful for the attacker. It can easily attack to victim system. Information gathering may be helpful even on a large scale.
Here we have two types of reconnaissance.
1- Passive Reconnaissance.
           Hacker is acquiring the information about target system without interacting the target directly.
Social media searching for collecting information about the target is an example of passive reconnaissance.
2- Active Reconnaissance.
           It is gaining information by acquiring the target directly.
Calls and emails are an example of active reconnaissance.
Scanning.
          It is a pre-attack phase. In this phase, attacker scans the network by acquiring information during the initial phase of reconnaissance. It includes Dialler, Scanners such as Port scanners, ping, as well as vulnerabilities scanner. During this phase, attackers fetches all the information of ports.
Gaining Access.
          It is the point where the hacker gets the control over an OS, application or computer network. It is an unauthorized access that a hacker gains it includes password cracking, denial of service, session hijacking and some other access.
Maintaining Access.
          It is that point where an attacker is trying to maintain the access and controlled over the compromised systems. In this phase, an attacker may steal information by uploading the information to the remote server. When the target system download that file from the server and runs it on their system, then the attack launches. They use Backdoor or Trojans to retain their ownership.
Clearing Tracks.
          An attacker must hide his identity by covering the tracks.These are those activities that are used to hide the malicious activities. It is most required for an attacker to fulfill their intention s by continuing the access, remain unnoticed. For manipulating identity and evidence, attackers overwrites the system, application, and some other related logs.

0 Comments:

Thanks for your comment.