Hacking 105 - Kapil Sharma
Stages of hacking in details:
1. First stage is information gathering: It can be social information gathering can spying on target activities or checking social networking records. So that all information compiled in one place a required information can be extracted from that single source information pool.
2. Scanning: Try/test the system open ports or information channels to gain access into the system/machine. Can be check from simple cmds like "ping, netstat, finger, nslookup, ipconfig, hostname, ftype" and many other cmds.
3. Access: In this case hacker gain the machine access and start exploring system for target contents/data.
4. Maintaining Access: In this hacker try to create back door ports or channels to re-gain entry again and again to target machine.
5. Covering tracks: If its one time hack and hacker got what he/she looking for than hacker try to remove its digital foot prints from the target machine ASAP, so that later any security audit or forensic scan cannot find hacker system access information.
Hidding digital tracks but how? As every machine generate system activity logs?
ReplyDelete