Ethical Hacking: Beginners Guide For The I.T. Security Expert by Fiordelis Stephen
Author:Fiordelis, Stephen [Fiordelis, Stephen]
Language: eng
Format: epub
Published: 2020-03-19T16:00:00+00:00
Phases of Ethical Hacking
Ethical hacking is divided into five phases. Not every hacker needs to use this step sequentially. Depending on the targets, these phases can be utilized accordingly. For desired results and output, it is recommended that these phases are to be followed in a defined way. The 5 phases of ethical hacking are:
✓ Reconnaissance
✓ Scanning
✓ Gaining Access
✓ Maintaining Access
✓ Clearing Tracks
1. Reconnaissance:
Reconnaissance is known as the initial step of ethical hacking. Alternatively, it is also known as the process of footprinting. In this phase, the idea is to gather all the relevant details and information. Considering its importance, requirement gathering is done at this step. The prime focus of this stage is to fetch a detailed overview of the target. It is a set of technique that is based on three processes (Footprinting, Scanning & Enumeration). During the Reconnaissance phase, there are seven steps that are to be covered first.
➢ Collection of relevant information
➢ Range of the network
➢ Determine the number of active machines in a network
➢ Identify the total number of ports including active and inactive ones
➢ Fingerprint the operating system
➢ Uncover services on ports
➢ Map the network
Basically, reconnaissance is completed in two parts.
1. Active Reconnaissance.
2. Passive Reconnaissance.
Active Reconnaissance
Active Reconnaissance is about assembling informative content from a computer system. The importance of this step is because fetched details are relevant and accurate. On the other hand, there is a huge risk involved in this step. There is a probability that a hacker can get caught while going through this phase. Once you are found guilty, you may have to face consequences.
Passive Reconnaissance
Passive Reconnaissance is a lot different than Active Reconnaissance. In this strategy, hackers don’t use any physical means of connectivity with the target system. The idea is to get all the material without doing any kind of interaction.
2. Scanning:
Scanning is the second phase of ethical hacking. During this phase, three kinds of scanning techniques are involved. The scanning process is responsible for finding the behavior of the target. Once there is an intrusion, it is vital to understand the status of the application code. It can either be static or functioning at the same time. Functioning code is termed as the most practical approach during the scanning process.
➢ Port scanning:
It is a step that is directly involved with the details of open ports, running systems and services.
➢ Vulnerability Scanning :
This process revolves around the identification of any loopholes or weaknesses that can be exploited with the help of automated tools and services.
➢ Network Mapping :
Network mapping is all about the concept of network topology. Wireless devices like network routers, firewalls and servers must be highlighted in this step. Drawing a whole diagram is beneficial for the whole hacking process.
3-Gaining Access:
Right after the process of scanning, hackers design a complete blueprint of targeted network design. With the help of the first two phases, any hacker can attack the network using techniques like SQL injection, cross-site scripting, and backdoors. Gaining access is the stage where real hacking is directly involved.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Coding Theory | Localization |
Logic | Object-Oriented Design |
Performance Optimization | Quality Control |
Reengineering | Robohelp |
Software Development | Software Reuse |
Structured Design | Testing |
Tools | UML |
Deep Learning with Python by François Chollet(12595)
Hello! Python by Anthony Briggs(9928)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(9804)
The Mikado Method by Ola Ellnestam Daniel Brolund(9790)
Dependency Injection in .NET by Mark Seemann(9348)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8310)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(7773)
Grails in Action by Glen Smith Peter Ledbrook(7705)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(7569)
Becoming a Dynamics 365 Finance and Supply Chain Solution Architect by Brent Dawson(7200)
Microservices with Go by Alexander Shuiskov(6962)
Practical Design Patterns for Java Developers by Miroslav Wengner(6878)
Test Automation Engineering Handbook by Manikandan Sambamurthy(6824)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6427)
Angular Projects - Third Edition by Aristeidis Bampakos(6247)
The Art of Crafting User Stories by The Art of Crafting User Stories(5760)
NetSuite for Consultants - Second Edition by Peter Ries(5688)
Demystifying Cryptography with OpenSSL 3.0 by Alexei Khlebnikov(5501)
Kotlin in Action by Dmitry Jemerov(5076)
