Part-1
Ethical Hacking courseCyber Ninja
MK
In this blog covered by Ethical Hacking basic methodology covered topic of Reconnaissance, Scanning and Enumeration, Gaining access, Escalation of privilege, Maintaining access, Covering tracks.
Ethical Hacking Basic
MK Community
*Cracker's Methodology*
1)Performing Reconnaissance (This gathering information for your victim)
2)Scanning and Enumeration
3)Gaining Access
4)Escalation of privilege
5)Maintaining Access
6)Covering Tracks (This is Erase your evidence of there attack)
*Ethical Hacker's Methodology*
1)Get permission***(Ethical hackers and Employee are contracted to conduct penetration testing)***
2)Performing Reconnaissance (This gathering information for your victim)
3)Scanning and Enumeration
4)Gaining Access
5)Escalation of privilege
6)Maintaining Access
7)Covering Tracks (This is Erase your evidence of there attack)
8)Reporting (This use one for your interview and insert your resume)
Steps Explained:
༒Reconnaissance and Foot printing༒
=> Information gathering and knowing the target systems.
=> This is a technique for gathering
information on computer systems and the entities they belong to.
Reconnaissance take two steps:
1)Active Reconnaissance
2)Passive Reconnaissance
Ways to do Foot printing:
1)Active - Interaction
2)Passive - Publicly available
༒Scanning and Enumeration༒
=>Gethered information is used to identify
vulnerabilities.
=>Systems after collecting enough
information.
=>Check for live systems.
=>Check for open port's.
=>Scan for vulnerabilities.
=>Discovery of hosts and devices.
༒ Escalation of privilege༒
Privilege escalation take two steps:
1)Horizontal privilege escalation
2)Vertical privilege escalation
༒Maintaining Access༒
=>Maintaining access for a long time unless
the task is finished.
༒Covering Tracks༒
=>After the hack,close all tracks and leave no trace of hacking.
WhatsApp group Link :Click to Join
In this blog covered by Ethical Hacking basic methodology covered topic of Reconnaissance, Scanning and Enumeration, Gaining access, Escalation of privilege, Maintaining access, Covering tracks.
This easy method will 100% surely works and i hope this method will very easy for you.
Keep supporting
Cyber Ninja
MK







ConversionConversion EmoticonEmoticon