HACKING PROCESS
• FOOT PRINTING AND RECONNAISSANCE
This is a technique used for gathering information about computer systems and the
entities they belong to.
• SCANNING NETWORKS
This is the second phase of information gathering that hackers use to size up a
network. In this they dive deeper into the system to look for valuable data and
services in a specific IP address range.
• GAINING ACCESS
Hackers gain access on the system with the help of password cracking. Hackers
design the blueprint of the network of the target with the help of data collected
during phase 1 and phase 2.
• MAINTAINING ACCESS
Once an attacker gains access to the target system,the attacker can choose to use
both the system and its resources by making their own administrator account.
• CLEAR TRACK AND LOGS
An attacker would like to destroy evidence of his/her presence for various reasons
such as maintaining access and evading punitive action. Erasing evidence of a
compromise iss a requirement for any attacker who would like to remain obscure.
This is one of the best methods to evade trace back.
WHY BUSINESS NEED TO HIRE ETHICAL
HACKERS?
• To build a computer system that prevents hacker’s access and
safeguard system and information from malicious attack.
• To safeguard user or customer information available in business
transactions.
• Managing adequate preventive measures to prevent a data to reach.
• To create security awareness at all levels in a business.