Friday, 27 October 2017

5 Phases of Hacking

Dosto is post par apko main Hacking ke 5 Phaseske bare mai bataunga yeh apke liye jana bahut jaruri hai kyunki kisi bhi chij par target kane se pahle ye 5 steps ko follow karna padta hai agar apne yeh 5 phases sahi tarike se kar liye to ap sucessful ho sakte hai .

5 Phases of Hacking

*.Reconnaissance and Footprinting

*.Scanning and Enumeration 

*.Gaining Access

*.Maintaining Access

*.Covering trackes


*.Reconnaissance and Footprinting 

  • Reconnaissance isme ek hacker apne target ki information ko collect karta hai jaise agar hacker ka target koi website ya server hai to yeh jana jata hai ki website ke owner ki information ,website kis server par hosted hai ,domain kab  register hua or kis nam se hai ,email id or phone numbers, aisi jankari jo hacker ke liye usefull hoti hai. 
  • Footprinting do types ki hoti hai passive Footprinting and Active Footprinting Passive Footprinting mai hacker apne target ki information public available resources ka use karke jankari ikthi karta hai jaise internet se , visiting cards se. isme koi risk nahi hota  Active Footprinting mai hacker apne target se direct connect hokar jankari ikthi karta hai jaise kisi company ko target karna hai to hacker company mai call karke, mail karke, company ke employe se bat karke information collect karta hai.
*.Scanning and Enumeration 

  • Scanning mai hackers vo information collect karte hai jo Footprinting mai nahi ho sakti jaise ip address , open ports , vulnerabilities jaise agar hacker ka target website hai to hacker targeted website ka ip address , open ports  , vulnerabilities website mai kamiya dhundta hai.
  • Enumeration mai hackers apne target ke usernames ki jankari ikthi karta hai jaise agar target website ya computer hai to unke useraccounts , admin account ki information ko collect karta hai.
*.Gaining Access
  • Gaining Access hacking ka 3 phase hai isme hacker Footprinting or Scanning  ki help se mili jankari ka use karke apne target ko access karta hai. matalb hacker apne target ke sath connection bnata hai.
*.Maintaining Access
  • Maintaining Access main hacker apne target se connection banane ke bad apne targeted website ya computer par apna malware code , (RAT)  Remote Administration tool, backdoor bana deta hai taki agr future mai hacker ko dubara access karna ho to use koi problem na ho or virus se infected computer ko zombie system kehte hai.
*.Covering trackes
  • Covering trackes main hacker apne target par sucessfull attack karne ke bad vo har chij jise hacker pakda ja sakta hai use remove kar deta hai jaise history delete karna , virus ko remove karna , logs delete karna. sab kuch delete karne ke bad hacker apne ap ko safe kar leta hai.

Visit karne ke liye apka shukriya 


Acha Ethical Hacker kaise bane

0 comments:

Post a Comment

Powered by Blogger.

Comments

Facebook

Featured Posts

Recent Posts

Recent in Sports

Total Pageviews

Search This Blog

Blog Archive

Aap kaise hacker Banna chahte ho

Carousel

Event

Breaking

News Scroll

Recent Posts

Contact Form

Name

Email *

Message *

Followers

sponsor

sponsor
Hacking course

Tags

hacking (47) kali linux (38)

Categories

Translate

Recent Post

Popular

Facebook

Follow Us

Facebook