Please enable JavaScript.
Coggle requires JavaScript to display documents.
THE HACKING CYCLES (Phase 5 : Covering Tracks (Covering tracks refers to…
THE HACKING CYCLES
-
Phase 2 : Scanning
a set of procedures for identifying live hosts, ports, and services, discovering Operating system and architecture of target system, Identifying vulnerabilities and threats in the network.
-
-
-
-
Phase 3 : Gaining Access
Hacker designs the blueprint of the network of the target with the help of data collected during Phase 1 and Phase 2.
The method of connection the hacker uses for an exploit can be a local area network (LAN, either wired or wireless), local access to a PC, the Internet, or offline
The hacker has finished enumerating and scanning the network and now decide that they have a some options to gain access to the network.
Phase 1 : Reconnaissance
a set of processes and techniques used to covertly discover and collect information about a target system.
Reconnaissance Types
Active Recon
-
This recon is faster and more accurate, but it also makes much more noise.
Since we have to interact with the target to gain information, there’s an increased chance that we’ll get caught by a firewall or one of the network security devices. (Intrusion Detection Systems, network firewalls)
Passive Recon
doesn’t require any interaction with the target, so it is far less likely to be detected.
The trade off is that the information gained is not as accurate and it’s much slower than it’s active counterpart.
Passive recon is the act of watching the target. Instead of interacting with them, we can watch their traffic and gain information without so much as pinging them.