Stages of hacking in details: 1. First stage is information gathering: It can be social information gathering can spying on target activities or checking social networking records. So that all information compiled in one place a required information can be extracted from that single source information pool. 2. Scanning: Try/test the system open ports or information channels to gain access into the system/machine. Can be check from simple cmds like "ping, netstat, finger, nslookup, ipconfig, hostname, ftype" and many other cmds. 3. Access: In this case hacker gain the machine access and start exploring system for target contents/data. 4. Maintaining Access: In this hacker try to create back door ports or channels to re-gain entry again and again to target machine. 5. Covering tracks: If its one time hack and hacker got what he/she looking for than hacker try to remove its digital foot prints from the target machine ASAP, so that later any security audit...
Comments
Post a Comment