Before becoming a ethical hacker, should have knowledge about network, knowledge of protocols (TCP/IP, HTTP, SMTP), windows, UNIX, programming languages, authentication protocols, firewall, wireless, scanning etc.
Following are the five steps for hacking.
1. Reconnaissance: it is used to gather the information from the different resources (newspapers, company web site, and Google search), how much you can.
2. Scanning: in this step try to find out the active IP address with the help of ping command etc. and also locate the different TCP/UDP ports.
3. Gain Access: after the scanning, net target is to gain the access it can be done with the help of buffer overflow and password guess.
4. Maintain Access: it is very difficult to gaining the access but it is more difficult to maintain the access without leaving any evidence. Try to take the help of backdoor program or Trojan horse.
5. Cover Tracks: after taking full access of the server, then delete the log file, in his way hackers can hide or disguise from the company. The best way is used the real program name of Trojan virus and copied it to the different directory.
No comments:
Post a Comment