🥷Five stages of Ethical Hacking
Last updated
Last updated
There are 2 types of Reconnaissance:
Active and Passive
Passive: All info available on the internet using Google, LinkedIn, Facebook, Twitter, etc.
Active: This type of recon is when we use tools like Nmap, Nessus, Nikto.
In this phase we take a look using active recon. Looking for open ports, vulnerabilities, and different items. What returns on these results when we do the scanning, we also perform what is called enumeration. Example:
Knowing the version of the webserver like Apache 1.x, then we look into google to see if is vulnerable.
This is when we exploit a vulnerability to try to gain access to the network, once we do this, the process tend to repeat. Example:
You see that the SMB Protocol is Vulnerable to EternalBlue and you continue to exploit. You finally get access to that computer/machine.
This is for in case we get kicked out or a user shuts down their computer, how do we maintain that access, so when they turn their computer back on, we still have access to it.
You want to delete any kind of log or malware which is more important as a pen tester. Any accounts that you create for any reason. In resume this is more a Clean Up.
Reconnaissance --->
Scanning & Enumeration
--->
Gaining Access & Explotation --->
Maintaining Access --->
Covering Tracks