Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (1 vote)
76 views3 pages

Hacking Process: - Foot Printing and Reconnaissance

The document outlines the typical hacking process and why businesses need to hire ethical hackers. The hacking process involves footprinting and reconnaissance to gather initial information, scanning networks to find valuable data and services, gaining access typically through password cracking, maintaining access by creating administrator accounts, and clearing logs and tracks to avoid detection. Businesses hire ethical hackers to build secure computer systems, safeguard customer information from attacks, implement preventive measures to protect data, and create security awareness throughout the organization.

Uploaded by

Dhruv Rajpal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (1 vote)
76 views3 pages

Hacking Process: - Foot Printing and Reconnaissance

The document outlines the typical hacking process and why businesses need to hire ethical hackers. The hacking process involves footprinting and reconnaissance to gather initial information, scanning networks to find valuable data and services, gaining access typically through password cracking, maintaining access by creating administrator accounts, and clearing logs and tracks to avoid detection. Businesses hire ethical hackers to build secure computer systems, safeguard customer information from attacks, implement preventive measures to protect data, and create security awareness throughout the organization.

Uploaded by

Dhruv Rajpal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 3

HACKING PROCESS

• FOOT PRINTING AND RECONNAISSANCE


This is a technique used for gathering information about computer systems and the
entities they belong to.

• SCANNING NETWORKS
This is the second phase of information gathering that hackers use to size up a
network. In this they dive deeper into the system to look for valuable data and
services in a specific IP address range.
• GAINING ACCESS
Hackers gain access on the system with the help of password cracking. Hackers
design the blueprint of the network of the target with the help of data collected
during phase 1 and phase 2.

• MAINTAINING ACCESS
Once an attacker gains access to the target system,the attacker can choose to use
both the system and its resources by making their own administrator account.

• CLEAR TRACK AND LOGS


An attacker would like to destroy evidence of his/her presence for various reasons
such as maintaining access and evading punitive action. Erasing evidence of a
compromise iss a requirement for any attacker who would like to remain obscure.
This is one of the best methods to evade trace back.
WHY BUSINESS NEED TO HIRE ETHICAL
HACKERS?
• To build a computer system that prevents hacker’s access and
safeguard system and information from malicious attack.

• To safeguard user or customer information available in business


transactions.

• Managing adequate preventive measures to prevent a data to reach.

• To create security awareness at all levels in a business.

You might also like