Technology Security Analyst
Ethical hacking has several different phases. It allows hackers to make an organized hacking attack. Various security training manuals describe ethical hacking in several ways, but the whole process can be grouped into the following six stages. To sum it all up, this approach is used by an attacker to break the network, while the ethical hacker uses it to protect it.
The ethical hacking process is given as follows:
Reconnaissance also called the preparatory phase is the process in which the attacker obtains information about a target. NMAP, Maltego, Google Dorks, Hoping, etc. are the tools that are commonly used in this process.
There are two types of reconnaissance
Dumpster jumping is one of the initial steps of observation. The programmer tracks down valuable data during this stage, similar to, names of significant workers, old passwords and performs dynamic observing to realize how the association works. The programmer finishes an interaction called footprinting to assemble security act information as the following stage, diminishes the center region including recognizing exceptional IP addresses, distinguishes weaknesses inside the planned framework, and at last attracts an organization guide to know precisely how the organization foundation works to effectively break into it. Significant data like area names, TCP and UDP administrations, gadget names, and passwords are given by Footprinting. There are alternate ways of doing footprinting as well. It includes copying a site by reflecting it utilizing web crawlers to gather authoritative data, and involving current worker data for impersonations.
The attacker starts actively testing a target computer or network in this process for vulnerabilities that can be exploited. Nessus, NMAP, and Nexposeare the tools used in this process.
There are Three types of scanning involved in this process.
The vulnerability is found in this step and hacker tries to exploit it to get into the system. Metasploit is the main tool used in this process.In order to track the devices connected to the system, the hacker gains access to the network, device, and software and expands their user privileges.
This is the process in which the hacker has already obtained access to a computer. The hacker activates some backdoors after obtaining access to penetrate the device when he wants access in the future in this proprietary system. The preferred method in this phase is Metasploit.
This phase is an unethical operation.No robber wants to be caught. An excellent hacker always removes all traces so that no one will find any evidence leading to him in the later stage of time. This includes corrupting, modifying, or deleting log values, Removing the cookies and cache, uninstalling all of the applications that he used, closing all the open ports, modifying the registry values, modifying the log files and deleting all of the folders that he made. This can be done with the help of various ways which are given as follows
The last step in completing the ethical hacking process is reporting. In this process, Ethical Hacker gathers a report with his results and the work that has been performed, such as the instruments used the rate of performance, vulnerabilities identified, and the processes of exploitation.