Ethical Hacking For Beginners (Chapter-3)

cyber security

Steps used in Ethical Hacking:-

There are mainly 5 steps in ethical hacking/ cyber security.

1. Reconnaissance

2. Scanning

3. Gaining Access

4. Maintaining Access

5. Clearing Track


1. Reconnaissance:- 

The process of collecting information about your defined target in depth is known as reconnaissance. Attackers perform this step before diving into any hacking attack. It’s basically a data collection procedure for the targeted victim. It contains several smaller steps also that are:-

  • Footprint:- Gathering data about the target system. It mostly scans the OS, firewall, IP address, Server details, ISP/ VPN details of the target system.

  • Enumeration:- This is the substep of reconnaissance where the attacker tries to find out the victim’s Name, System’s name( for future attack mostly social engineering attacks.

  • Scanning:- The most important step is to find all the machines/ servers in a network/ framework (mostly in LAN mode) associated with a networking device (router) and scan it's an open port for performing an attack to compromise a group of systems or an organization.

2. Scanning:- 


The second step after defining and doing background research about the target victim/ system/ organization.

There are a few types of scanning attempts attackers do they are mostly:-


  • Network Scan:- Scanning of victim’s computer’s Open ports, IP address, the running process in that system, OS details, system configuration etc.


  • Port Scan:- It’s similar to finding the backdoor of the victim’s system by using which attacker will gain access later. It include TCP/UDP port scans also


  • Vulnerability Scan:- FInding the weakness of the victim's system. Now weakness depends upon various factors. The most common weakness(Vulnerability) is OS vulnerability(outdated OS) and Network vulnerability(Unencrypted network/ using public network/Wifi). And some others are not using firewalls, using unauthenticated software/ keygen which mostly contains malware.

3. Gaining Access:- 


Now comes the actual step. Gaining access to the victim's system. There are several methods available for gaining access. Most common are:-


  • Password cracking:- most common password cracking methods are brute force, dictionary attack, rainbow table attack, phishing, social engineering, malware attack.


  • Unsecured Network:- If the victim using a network which don’t have any encryption, or using any public network,


  • Spyware:- Most common method, sending spyware through email, any software or through any communication medium to the victim's system and gaining access to that system through that spyware. (mostly trojan)


  • Session Hijacking/ Man in the middle:- This attack is performed using session cookie hijacking from the victim’s browser or through getting access to the victim's unprotected network. And in this case, the attacker silently captures the in/outbound data transmitting from the victim's system.


  • Phishing attack:- In this case victim is being tricked by the attacker to enter his/her credentials to a fake website/ system without identifying that fake system. Most attackers send a fake link through mail/ other communication medium pretending to be a legitimate authority.


  • Data Breach:- Nowadays it is the most common way of getting the victim of cyber fraud. And it’s out of the end user’s control. Most attackers target the big companies’ user database and find out user information, id card, email id, location, and in fact credit card details too.

To avoid this type of attack users are always warned to change their credentials at least once in a month(basically password/ security pin). And never share any sensitive information through phone or mail without being sure that the person on the other side of the phone/ mail is 100% legitimate.

4. Maintaining access:-

The step is when an attacker tries to maintain the access/ ownership which he gained over the victim’s machine. For this step, they use the backdoor, rootkit, rat, trojans, etc. And they try to upload sensitive data from the victim’s pc to their server or system. (which they use at a later point of time for blackmailing/ threatening the victim) And after that in some cases, they lock(Encrypt) the victim’s PC and ask for ransom (bribe) to unlock the PC(Ransomware attack). And mostly they just take the ransom and fly away.


5. Clearing Track:- 

After performing a successful attack the attacker clears all the evidence of that attack so that cyber forensic experts can’t trace back them or can’t take any legal action. In this step attackers mostly clear all the log files from the victim's PC as well as their own PC too, Clears up all connections which they established, destroy all the payloads, rootkits, rats, trojans, etc. And in some cases, they also destroy their systems too after backing up all the data from it so that nobody can’t trace it back them.

In the next chapter, we will discuss Linux. So stay tuned and Happy Learning!.

0 Comments:

Post a Comment

Contact

Contact Me

I am open to hire. If you like my work, feel free to contact me. And also if you have any query, suggestions or complaint you can contact me too. Just fill up the form or DM me, and i'll get back to you asap.

Work Time:

Monday - Sunday from 11am to 11pm