Part-1
Ethical Hacking course

Cyber Ninja
MK


In this blog covered by Ethical Hacking basic methodology covered topic of Reconnaissance, Scanning and Enumeration, Gaining access, Escalation of privilege, Maintaining access, Covering tracks.

Ethical Hacking Basic

MK Community

*Cracker's Methodology*

1)Performing Reconnaissance (This gathering information for your victim)

2)Scanning and Enumeration

3)Gaining Access

4)Escalation of privilege 

5)Maintaining Access

6)Covering Tracks (This is Erase your evidence of there attack)

*Ethical Hacker's Methodology*

1)Get permission***(Ethical hackers and Employee are contracted to conduct penetration testing)***

2)Performing Reconnaissance (This gathering information for your victim)

3)Scanning and Enumeration

4)Gaining Access

5)Escalation of privilege

6)Maintaining Access

7)Covering Tracks (This is Erase your evidence of there attack)

8)Reporting (This use one for your interview and insert your resume)


Steps Explained:

༒Reconnaissance and Foot printing༒
=> Information gathering and knowing the       target systems.
=> This is a technique for gathering    
      information on computer systems and          the entities they belong to.

Reconnaissance take two steps:
1)Active Reconnaissance
2)Passive Reconnaissance

Ways to do Foot printing:
1)Active - Interaction
2)Passive - Publicly available


༒Scanning and Enumeration༒
=>Gethered information is used to identify
     vulnerabilities.
=>Systems after collecting enough
     information.
=>Check for live systems.
=>Check for open port's.
=>Scan for vulnerabilities.
=>Discovery of hosts and devices.


༒ Escalation of privilege༒
Privilege escalation take two steps:
1)Horizontal privilege escalation
2)Vertical privilege escalation


༒Maintaining Access༒
=>Maintaining access for a long time unless
    the task is finished.


༒Covering Tracks༒
=>After the hack,close all tracks and leave        no trace of hacking.


WhatsApp group Link :Click to Join

In this blog covered by Ethical Hacking basic methodology covered topic of Reconnaissance, Scanning and Enumeration, Gaining access, Escalation of privilege, Maintaining access, Covering tracks.

This easy method will 100% surely works and i hope this method will very easy for you.

Keep supporting

 Cyber Ninja
MK 




Oldest