🥷Five stages of Ethical Hacking
Hacking Methodology
Reconnaissance --->
Scanning & Enumeration
--->
Gaining Access & Explotation --->
Maintaining Access --->
Covering Tracks
Reconnaissance
There are 2 types of Reconnaissance:
Active and Passive
Passive: All info available on the internet using Google, LinkedIn, Facebook, Twitter, etc.
Active: This type of recon is when we use tools like Nmap, Nessus, Nikto.
Scanning & Enumeration
In this phase we take a look using active recon. Looking for open ports, vulnerabilities, and different items. What returns on these results when we do the scanning, we also perform what is called enumeration. Example:
Knowing the version of the webserver like Apache 1.x, then we look into google to see if is vulnerable.
Gaining Access & Exploitation
This is when we exploit a vulnerability to try to gain access to the network, once we do this, the process tend to repeat. Example:
You see that the SMB Protocol is Vulnerable to EternalBlue and you continue to exploit. You finally get access to that computer/machine.
Maintaining Access
This is for in case we get kicked out or a user shuts down their computer, how do we maintain that access, so when they turn their computer back on, we still have access to it.
Covering Tracks
You want to delete any kind of log or malware which is more important as a pen tester. Any accounts that you create for any reason. In resume this is more a Clean Up.
Last updated