Hacking is the act of compromising digital services and networks to gain unauthorized access of an account or device.
Phases of Hacking
- Information Gathering
- Scanning
- Gaining Access
- Maintaining Access
- Clearing tracks
Information Gathering about the target
Information gathering also known as Reconnaissance which is set of processes and techniques to collect information about the target.
Reconnaissance
- It can be conducted in various ways including physical surveillance, online research or by using specified tools (softwares) and techniques.
- Popular techniques used for reconnaissance:
- Gather Initial Information Using Social Engineering
- It includes psychological manipulation techniques to deceive people into providing sensitive information or performing certain actions
- Phishing, scareware(tempting to visit spoofed or infected websites to inject/download malwares into target's system), baiting etc.
- Footprinting
- This technique involves gathering info about target's infrastructure and assets.
- Here, we gather IP addresses, WHOIS records, DNS records and other technical details
- Network Scanning
- It involves determining network range(IP addresses), identifying active machine and discover open ports and access points
- It involves sending packets to range of IP addresses and ports on a target system and analyzing the responses.
- Various tools are availble for network scanning.
- The goal is to create the network map of IP addresses of active systems, open ports, and services to identify vulnerabilities.
- OS Fingerprinting
- It involves determining the operating system that is running on target system
- By analysing the response of packets of different ports of target system, we may able to determine the OS
- Vulnerability Scanning
- This technique involves using specialized tools to scan a target's assets for known vulnerabilities
- OSINT (Open-Source Intelligence)
- Gather Initial Information Using Social Engineering
- Active vs Passive Reconnaissance
- Active Reconnaissance involves actively interacting with target system and carries higher risk of detection. Phishing, scareware, Network & Vulnerability Scanning etc.
- Passive Reconnaissance involves gathering information without active intraction and carries low risk of detection. OSINT, analyzing target traffic etc.
- Sources:
Note: Information Gathering Footprint commands:
- whois
- dig [-x]
- nslookup
- hostname
- traceroute
sublist3r [-v] [-f] <domain>
- hping3
- nmap
- masscan
- VBscan
Top comments (0)