• 2) Scanning the targets
  • Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line




    Download 6,34 Mb.
    Pdf ko'rish
    bet173/203
    Sana10.01.2024
    Hajmi6,34 Mb.
    #134102
    1   ...   169   170   171   172   173   174   175   176   ...   203
    Bog'liq
    Linux This Book Includes 4 Manuscripts The Underground Bible

    1) Foot-printing the system
    A good hacker would always at first try to know a lot of information about
    the target he is going to attack. This collection of information about the
    target is known as reconnaissance. Many hackers use social engineering
    techniques to get information from the users themselves.
    A good hacker has good communication skills that can help him to
    manipulate things to get information about the target he is trying to attack.
    To say using an analogy a hacker works like a detective to track the target.
    He looks at all the publicly available information and will form a roadmap
    for a better strategy to attack. 
    As said before hackers manipulate individuals to perform tasks like
    resetting passwords or sending one-time passwords using social engineering
    techniques.
    A lot of hackers also use Google search in-depth to get as much information
    about the target. This is one of the most important phases of hacking. 


    Kali Linux provides software such as nmap and burp to perform
    reconnaissance.
    2) Scanning the targets 
    This is considered the second phase of the hacking process. In this step, we
    will try to scan the target and find any ports that are open to getting a
    successful linkage to attack. We will also use a concept called enumeration
    in this phase to get a lot of advanced information about the users. All this
    useful information can be further analyzed by hackers to get varied results. 
    In this phase, the attackers usually start network scanning using the
    available network tools like Nmap. These network tools are made available
    to run on systems so that the available open ports can be detected. Open
    ports are vulnerable and can help us to create a backdoor to the system. 
    However, the attackers should keep in mind that fast searching of the
    systems or sending a lot of packets can give a huge increase in network
    traffic and can make the system administrators alert. For this reason,
    experienced hackers extend this phase for at least a week so that they send
    packets slowly in such a way that the very advanced intrusion detection
    systems can never detect the attack that is going on. 
    In this phase, we can even analyze the ports to know about the operating
    systems and technologies that are being used. A lot of hackers after this
    stage will search databases like exploited to find the open vulnerabilities for
    the version of the software. If lucky, you can find a vulnerability that can be
    further used to attack the system. 
    Many novice hackers use automatic scanners like burp suite to detect the
    vulnerabilities that are present. Even though of being advanced scanners
    they will not accurately detect them always. They can be used for learning
    the basic implementation of scanning but not as a sole tool that can scan the
    targets. That is all about this phase and let us move on to the third one that
    is when we get successful access to the system.

    Download 6,34 Mb.
    1   ...   169   170   171   172   173   174   175   176   ...   203




    Download 6,34 Mb.
    Pdf ko'rish

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line

    Download 6,34 Mb.
    Pdf ko'rish