Please enable JavaScript.
Coggle requires JavaScript to display documents.
5 PHASE HACKING CYCLE :unlock: (GAINING ACCESS (Attackers breaks into the…
5 PHASE HACKING CYCLE :unlock:
1.RECONNAISSANCE
Hacker tries to collect information about the target which , host and people who involved in it (Footprinting).
There are two types of Footprinting
Active : Directly interesting with the target to gather information about the target
Passive : Trying to collect the information about the target without directly accessing the target.
2.SCANNING
Includes usage of tools like dialers, port scanners, network mappers, sweepers and vulnerability scanner to scan data
Three types of scanning
Port Scanning
Vulnerability
Network Mapping
GAINING ACCESS
Attackers breaks into the systems using various tools or method.
To find the vulnerabilities and the exploit them by stealing, intercepting traffic, and interfering privileges to understands the amount of damage that it can cause .
owning the system because once a systems has been hacked, the hacker has control and can use that system they wish.
4.MAINTAINING ACCES
Hacker may just hack the system to show it was vulnerable or he can be so mischievous that he wants to maintain or persist the connection int the background without the knowledge of the user.
To maintain the access to the target until he finishes the tasks he planned to accomplish in that target
5.CLEARING TRACKS
Hackers always clears all evidence so that in that later point of time, no one will find any traces leading to him.
Involves modifying, corrupting, deleting the values of Logs, modifying register values and uninstalling all applications he used and deleting all folders he created