P4- Stages of Ethical Hacking
Hi, Today we are starting to learn the actual course content that we are here for, "Ethical Hacking". let's begin!
There are five stages of ethical hacking:
Reconnaissance:
Reconnaissance aka information gathering.
There are two types of Reconnaissance, Active and Passive Reconnaissance.
Passive Reconnaiosece is where an ethical hacker google about any company, gather the information by going through different search engines, by going through the Facebook page of the company or by visiting the profile of the employees, making a list of the email of the employees by going through their twitter or FB account, etc, etc, so not doing anything directly, the company does not know about this.
Whereas Active Rconnaisence is where an ethical hacker goes through the network of any company by any means. In this, the ethical hacker actually discovers the hosts Ip, servers, and services on the network of the company. He/She goes through the actual website of the company and do the research. (Active reconnaissance kind of falls into the category of scanning which is the next stage)
Scanning & Enumeration:
In this stage, the ethical hacker is gonna examine the information that he/she gathered in the previous stage. He/she will use different tools to scan against any network like Nmap, Nessus, etc.
For instance, he/she found out that there are several ports open on a machine, he/she will look for what services are running on those ports.
Now comes the Enumeration part. After Scanning, the ethical hacker has the information about the loopholes but now he/she will search to dig into that hole, which is called enumeration. For instance, he/she knows that on port 80, Apache server 1.2 is running on a port, he/she will google that "what are the exploits/attacks he.she can launch through this outdated version of apache".
Gaining Access:
As the name describes, in this stage, an ethical hacker is actually gonna exploit those vulnerabilities, compromising the security. So launching the attacks is done in this stage.
Maintaining Access:
Once the ethical hacker has gained access, he/she wanna maintain the access, so maybe he/she will make any backdoor or anything else to maintain the access. This is needed if the user shuts down his machine or anything else, so how is the ethical hacker gonna maintain that access that he just gained.
Covering Tracks:
At last, the ethical hacker doesn't wanna be caught, he/she would just delete log files, maybe delete some accounts that he/she made to gain access, etc, leaving no mark behind.
and so the cycle repeats.
Note: Please use the information learned in this for only ethical purposes.
There are five stages of ethical hacking:
- Reconnaissance
- Scanning & Enumeration
- Gaining Access
- Maintaining Access
- Covering tracks
Reconnaissance:
Reconnaissance aka information gathering.
There are two types of Reconnaissance, Active and Passive Reconnaissance.
Passive Reconnaiosece is where an ethical hacker google about any company, gather the information by going through different search engines, by going through the Facebook page of the company or by visiting the profile of the employees, making a list of the email of the employees by going through their twitter or FB account, etc, etc, so not doing anything directly, the company does not know about this.
Whereas Active Rconnaisence is where an ethical hacker goes through the network of any company by any means. In this, the ethical hacker actually discovers the hosts Ip, servers, and services on the network of the company. He/She goes through the actual website of the company and do the research. (Active reconnaissance kind of falls into the category of scanning which is the next stage)
Scanning & Enumeration:
In this stage, the ethical hacker is gonna examine the information that he/she gathered in the previous stage. He/she will use different tools to scan against any network like Nmap, Nessus, etc.
For instance, he/she found out that there are several ports open on a machine, he/she will look for what services are running on those ports.
Now comes the Enumeration part. After Scanning, the ethical hacker has the information about the loopholes but now he/she will search to dig into that hole, which is called enumeration. For instance, he/she knows that on port 80, Apache server 1.2 is running on a port, he/she will google that "what are the exploits/attacks he.she can launch through this outdated version of apache".
Gaining Access:
As the name describes, in this stage, an ethical hacker is actually gonna exploit those vulnerabilities, compromising the security. So launching the attacks is done in this stage.
Maintaining Access:
Once the ethical hacker has gained access, he/she wanna maintain the access, so maybe he/she will make any backdoor or anything else to maintain the access. This is needed if the user shuts down his machine or anything else, so how is the ethical hacker gonna maintain that access that he just gained.
Covering Tracks:
At last, the ethical hacker doesn't wanna be caught, he/she would just delete log files, maybe delete some accounts that he/she made to gain access, etc, leaving no mark behind.
and so the cycle repeats.
Note: Please use the information learned in this for only ethical purposes.
ACTIVE & FRESH CC FULLZ WITH BALANCE
ReplyDeletePrice $5 per each CC
US FRESH, TESTED & VERIFIED SSN LEADS
$1 PER EACH
$5 FOR PREMIUM DATA
CC DETAILS
=>CARD TYPE
=>FIRST NAME & LAST NAME
=>CC NUMBER
=>EXPIRY DATE
=>CVV
=>FULL ADDRESS (ZIP CODE, CITY/TOWN, STATE)
=>PHONE NUMBER,DOB,SSN
=>MOTHER'S MAIDEN NAME
=>VERIFIED BY VISA
=>CVV2
SSN LEADS INFO
First Name | Last Name | SSN | Dob | Address | State | City | Zip | Phone Number | Account Number | Bank NAME | DL Number | Home Owner | IP Address |MMN | Income
Contact Us
-->Whatsapp > +923172721122
-->Email > leads.sellers1212@gmail.com
-->Telegram > @leadsupplier
-->ICQ > 752822040
*You can buy for your specific states too
*Payment in advance
*Hope for the long term deal
*Time wasters or cheap questioners please stay away
*If you buy leads in bulk, I'll definitely negotiate
*You can ask me for sample of Lead for demo
US DUMP TRACK 1 & 2 WITH PIN CODES ALSO AVAILABLE