Friday, 27 October 2017
5 Phases of Hacking
October 27, 2017
|
Dosto is post par apko main Hacking ke 5 Phaseske bare mai bataunga yeh apke liye jana bahut jaruri hai kyunki kisi bhi chij par target kane se pahle ye 5 steps ko follow karna padta hai agar apne yeh 5 phases sahi tarike se kar liye to ap sucessful ho sakte hai .
5 Phases of Hacking
*.Reconnaissance and Footprinting
*.Scanning and Enumeration
*.Gaining Access
*.Maintaining Access
*.Covering trackes
*.Reconnaissance and Footprinting
5 Phases of Hacking
*.Reconnaissance and Footprinting
*.Scanning and Enumeration
*.Gaining Access
*.Maintaining Access
*.Covering trackes
*.Reconnaissance and Footprinting
- Reconnaissance isme ek hacker apne target ki information ko collect karta hai jaise agar hacker ka target koi website ya server hai to yeh jana jata hai ki website ke owner ki information ,website kis server par hosted hai ,domain kab register hua or kis nam se hai ,email id or phone numbers, aisi jankari jo hacker ke liye usefull hoti hai.
- Footprinting do types ki hoti hai passive Footprinting and Active Footprinting Passive Footprinting mai hacker apne target ki information public available resources ka use karke jankari ikthi karta hai jaise internet se , visiting cards se. isme koi risk nahi hota Active Footprinting mai hacker apne target se direct connect hokar jankari ikthi karta hai jaise kisi company ko target karna hai to hacker company mai call karke, mail karke, company ke employe se bat karke information collect karta hai.
- Scanning mai hackers vo information collect karte hai jo Footprinting mai nahi ho sakti jaise ip address , open ports , vulnerabilities jaise agar hacker ka target website hai to hacker targeted website ka ip address , open ports , vulnerabilities website mai kamiya dhundta hai.
- Enumeration mai hackers apne target ke usernames ki jankari ikthi karta hai jaise agar target website ya computer hai to unke useraccounts , admin account ki information ko collect karta hai.
- Gaining Access hacking ka 3 phase hai isme hacker Footprinting or Scanning ki help se mili jankari ka use karke apne target ko access karta hai. matalb hacker apne target ke sath connection bnata hai.
*.Maintaining Access
- Maintaining Access main hacker apne target se connection banane ke bad apne targeted website ya computer par apna malware code , (RAT) Remote Administration tool, backdoor bana deta hai taki agr future mai hacker ko dubara access karna ho to use koi problem na ho or virus se infected computer ko zombie system kehte hai.
*.Covering trackes
- Covering trackes main hacker apne target par sucessfull attack karne ke bad vo har chij jise hacker pakda ja sakta hai use remove kar deta hai jaise history delete karna , virus ko remove karna , logs delete karna. sab kuch delete karne ke bad hacker apne ap ko safe kar leta hai.
Subscribe to:
Post Comments
(Atom)
Powered by Blogger.
Comments
Featured Posts
Recent Posts
Recent in Sports
Total Pageviews
Search This Blog
Blog Archive
Aap kaise hacker Banna chahte ho
Event
Breaking
News Scroll
Recent Posts
About Me
Contact Form
Followers
Tags
hacking
(47)
kali linux
(38)
Categories
Translate
Recent Post
Popular
-
Whois Lookup and IP Lookup Whois Lookup ⇒ Dosto is post par mai apko Whois Lookup and IP Lookup ke bare mai bataunga Whois Lookup ka us...
-
Dosto is post par main apko Phishing attack ke bare mai bataunga ye post sirf educational purpose ke liye hai . Phishing attack ek bahut hi ...
-
Dosto is post par main aapko Signalling System 7 (ss7 attack) ke bare mai puri jankari dunga yeh post sirf educational purpose ke liye hai a...
-
Dosto is post par main aapko port ke bare mai jankari dunga jo ek hacker ke liye jaana bahut jaruri hai port forwarding ek rasta hota hai ja...
0 comments:
Post a Comment