Skip to main content

Steps of Ethical Hacking

Steps of Ethical hacking



  • Foot printing
  • Scanning
  • Enumeration
  • System hacking


NB: This will only be an introduction. I shall discuss the steps in details, bit by bit.

Footprinting: This is the first step in hacking. This involves gathering information about the target network, firm or organization. The information collected will help the attack successful. This step is the foundation of hacking. If data collected is inaccurate the attack is likely to fail. This happens during the  passive state of the system.

This steps target information that are carelessly handled or stored. Attack is as good as how accurate the information collected at this stage.

Information that can be collected or extracted include


  • IP addressing range
  • Phone Numbers
  • Email addressing
  • Name spaces
  • Employee information
  • facility information
  • Job information



Scanning: This stage deals with studying the system during it active time. It focuses on gathering more useful information which will help in achieving a successful outcome. Scanning give the attacker information about active hosts and how data flowed within the system.

Since this stage is about gathering information when the system is on or active, some tools or utilities have to be use.

Below are the tools used


  • Ping
  • Traceroute (in windows is called tracert)
  • Ping sweeps
  • port scanning


Enumeration: This is the second to the last step, but can be seen as the last step of gathering information. During this step, you need to go inside the system or network to get the remaining of information needed for successful hacking. Using step one and two this step will be a bit simple and easy.

Information gathered in this step include


  • Usernames
  • Passwords
  • Group information
  • Applications used
  • Hidden shares
  • Protocol information
  • Server data
  • Service information
  • Network topology


System Hacking: this is where the work is been done. Its the implementation stage of all data collected.  This step involves cracking the system, overriding of privileges,  covering of tracks, concealing of evidence and much more.
Tobe continued


Reference: Sybex CEH

Join us on Facebook: ICTmagazine BBM chanel: ICTmagazine



Comments

Popular posts from this blog

Powerful words from Steve Jobs on his sick bed

Powerful message. Steve Jobs’ Last Words - I reached the pinnacle of success in the business world. In others’ eyes, my life is an epitome of success. However, aside from work, I have little joy. In the end, wealth is only a fact of life that I am accustomed to. At this moment, lying on the sick bed and recalling my whole life, I realize that all the recognition and wealth that I took so much pride in, have paled and become meaningless in the face of impending death. In the darkness, I look at the green lights from the life supporting machines and hear the humming mechanical sounds, I can feel the breath of god of death drawing closer… Now I know, when we have accumulated sufficient wealth to last our lifetime, we should pursue other matters that are unrelated to wealth… Should be something that is more important: Perhaps relationships, perhaps art, perhaps a dream from younger days ... Non-stop pursuing of wealth will only turn a person into a twisted being, just l...

Microsoft Office for Tablet now on Google Play store

Back in November, Microsoft opened up early previews builds for its new mobile Office applications for Android tablets to those willing to sign up and wait for an invitation. After taking on feedback over the past couple of months, Microsoft has announced that it is expanding its preview scheme by releasing its Office applications to everyone directly through the Google Play Store. The new Office software for mobile unifies Android, IOS, and Windows platforms. Previously each platform had to make do with its own apps, meaning that feature sets differed depending on your operating system and updates were often slow and intermittent. By unifying the Office platform, Microsoft hopes to bring updates and new features to users in a timelier manner. There are still a couple of conditions attached to the preview builds though. Firstly, Office is still limited to ARM-based Android tablets with a screen size between 7 and 10.1 inches. Your tablet will also need to be running Ki...

Turn your Word doc into a PDF with a live table of contents

A long report needs to be broken up into sections. Readers will want shortcuts to the chapters that most interest them. So, if you’re distributing your reports as PDFs, you’ll want live tables of contents in which readers can easily go to the chapters they want to read. Fortunately, this is easy to do in Word 2010 or 2013 (I haven’t tested this in earlier versions). First of all, you need to set up your document properly. Use Word’s outline styles— Heading 1, Heading 2 , and so on—to organize your report. For instance, you might want to assign large section titles as Heading 1, chapter titles as Heading 2, sub-chapters as Heading 3, and so on. By the way, using these headings has other advantages. You can select View>Outline and work on your document as a collapsible outline. Also, the left tab of the Navigation pane uses these styles. But back to the table of contents. When you’re ready to distribute your document, select the References tab and click...