As an ethical hacker we have need to follow some general steps to be a good ethical hacker. Such that steps/stages can be listed as follows. But these steps are not a defined one. We can change them according to our needs. 1 . Reconnaissance – Gathering the information which are having the security vulnerability. 2 . Scanning - Examine/explore a target machine/network for the vulnerability that can be make use to go inside. 3 .Gaining Access – After scanning process make use of the vulnerability and attempt to move inside to the system to exploit. 4 . Maintaining Access – After moved into the machine/network hacker needs to make some backdoor to gain the access again. 5 . Clearing Tracks (unethical) – Clearing the traces of all the activities what they done in their hacking process. 6 . Reporting – End of the ethical hacking process in order to make some notes on the findings, things done in the hacking...

Comments
Post a Comment