Hacking 105 - Kapil Sharma

Stages of hacking in details: 


1. First stage is information gathering: It can be social information gathering can spying on target activities or checking social networking records. So that all information compiled in one place a required information can be extracted from that single source information pool.

2. Scanning: Try/test the system open ports or information channels to gain access into the system/machine. Can be check from simple cmds like "ping, netstat, finger, nslookup, ipconfig, hostname, ftype" and many other cmds.

3. Access: In this case hacker gain the machine access and start exploring system for target contents/data.

4. Maintaining Access: In this hacker try to create back door ports or channels to re-gain entry again and again to target machine. 

5. Covering tracks: If its one time hack and hacker got what he/she looking for than hacker try to remove its digital foot prints from the target machine ASAP, so that later any security audit or forensic scan cannot find hacker system access information. 

Comments

  1. Hidding digital tracks but how? As every machine generate system activity logs?

    ReplyDelete

Post a Comment

Popular posts from this blog

Hacking 102 - Kapil Sharma

Hacking 103 - Kapil Sharma