Steps of Ethical hacking
- Foot printing
- Scanning
- Enumeration
- System hacking
NB: This will only be an introduction. I shall discuss the steps in details, bit by bit.
Footprinting: This is the first step in hacking. This involves gathering information about the target network, firm or organization. The information collected will help the attack successful. This step is the foundation of hacking. If data collected is inaccurate the attack is likely to fail. This happens during the passive state of the system.
This steps target information that are carelessly handled or stored. Attack is as good as how accurate the information collected at this stage.
Information that can be collected or extracted include
- IP addressing range
- Phone Numbers
- Email addressing
- Name spaces
- Employee information
- facility information
- Job information
Scanning: This stage deals with studying the system during it active time. It focuses on gathering more useful information which will help in achieving a successful outcome. Scanning give the attacker information about active hosts and how data flowed within the system.
Since this stage is about gathering information when the system is on or active, some tools or utilities have to be use.
Below are the tools used
- Ping
- Traceroute (in windows is called tracert)
- Ping sweeps
- port scanning
Enumeration: This is the second to the last step, but can be seen as the last step of gathering information. During this step, you need to go inside the system or network to get the remaining of information needed for successful hacking. Using step one and two this step will be a bit simple and easy.
Information gathered in this step include
- Usernames
- Passwords
- Group information
- Applications used
- Hidden shares
- Protocol information
- Server data
- Service information
- Network topology
System Hacking: this is where the work is been done. Its the implementation stage of all data collected. This step involves cracking the system, overriding of privileges, covering of tracks, concealing of evidence and much more.
Tobe continued
Reference: Sybex CEH
Join us on Facebook: ICTmagazine BBM chanel: ICTmagazine
Comments
Post a Comment