Ethical Hacking General Steps

   

 Steps of Hacking

Sounds cool right? Finally getting into the matter! Anyways you must have observed that I haven't used the term ethical while in this heading, it's because this is the common procedure for all the types of hackers to hack someone. I will be using little technical terms so don't get confused it will be explained in the upcoming posts on my blog. So, coming to the point there are in total 11 steps, these all steps are mandatory if want to hack someone and to not to get caught.


steps:



1. Footprinting.

2. Network Scanning.

3. Port Scanning.

4. Version Detection Scan.

5. OS Fingerprinting.

6. Vulnerability Scanning.

7. Search and Build Exploit.

8. Social Engineering.

9. Attacking.

10. Maintaining access with Trojans.

11. Covering Tracks or cleaning Evidence.


so, guys, these are the steps to be followed for the task.
You must be having a question about what these all are, trust me later on you won't be having any such questions.


  • So how we remotely access or do hacking fo it?



It need two things to be known and built that is, Vulnerability and Exploit.

                                  Vulnerability and Exploit.



okay! Vulnerability?


 Vulnerability



Definition in simple terms for a Vulnerability is



" It is a weakness in any software application like buffer overflow, cross side scripting, SQL injection etc. Which helps hacker to hang the target or crash the software application is known as a vulnerability. "



For example, your house,
If suppose you are going for a vacation and you forgot to lock one of your windows, Now a thief came inside and stole all of your stuff.


so here the window is the vulnerability and your house is the software application.



Exploit

 

And now what the term Exploit does even mean?



In the above example as I mentioned the robbery case in your house, in which the window was the vulnerability and your house was that software and your stuff was the information. So, In this case, the thief is the exploit who actually is going inside and taking all the stuff and delivering it to his gang leader. So, you I mean the gang leader is the Hacker. Hope you got it!



so yeah! we do have a definition for this too!



"Exploit is a piece of malicious programming code or Software which takes help of vulnerabilities to crash the Software Application and hangs the target and after running the payload (keylogger, virus, trojans) etc."



More about Ethical hacking will be in my next post "Cyberwar".


Suggestion for better understanding read from the first post:"Ethical Hacking Introduction."


Comments

Popular posts from this blog

Managing Output with Manipulators in C++

What is sniffing?

Creating a bootable USB.