• Gaining Access
  • Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line




    Download 6,34 Mb.
    Pdf ko'rish
    bet102/203
    Sana10.01.2024
    Hajmi6,34 Mb.
    #134102
    1   ...   98   99   100   101   102   103   104   105   ...   203
    Bog'liq
    Linux This Book Includes 4 Manuscripts The Underground Bible

    Reconnaissance - In this stage, one needs to collect as much
    information about the platform they are hacking. The information should


    be collected in three parts, including network, host, and people involved.
    The data collection can be done into methods called footprinting. It can
    be active footprinting which consists of collecting information through
    interacting with the target. Passive footprinting consists of gathering
    information on the goal without interacting with the goal.
    2) 
    Scanning - This involves data collection of relevant information that
    one can use to gain access. In the scanning process, one will also
    evaluate which of the weaknesses found will be used to ensure that the
    hacker has been able to gain access to the system. Scanning should be
    conducted according to the various types of scans. One should first
    conduct a scan of the network and ports to understand the program or
    the system better. Use the ideas gained to know where there can be
    possible vulnerabilities. It is essential that scanning is conducted
    systematically that will ensure that the hacker does not forget to scan for
    anything. In the current phase, there are three types of scanning,
    including port scanning, vulnerability scanning, and network mapping.
    ❖ 
    Port scanning- in this scanning, the hacker will look for services
    that run on the target, open ports, and live systems.
    ❖ 
    Vulnerability scanning- Look for weaknesses in the target that
    one can use to gain access to the system. Once the defects have
    been identified, they can be exploited later.
    ❖ 
    Network mapping- Involves mapping out and getting an idea of
    how the target is arranged. For example, what network is being
    used, routers, and firewalls that protect the system. This
    information is essential in the hacking process and organizing the
    hack.
    3) 
    Gaining Access - the hacker will attempt to break into the system.
    This can be through the use of various tools. The hacker will also need
    to increase their privilege so that they can accomplish their task.
    4) 

    Download 6,34 Mb.
    1   ...   98   99   100   101   102   103   104   105   ...   203




    Download 6,34 Mb.
    Pdf ko'rish

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line

    Download 6,34 Mb.
    Pdf ko'rish