A hacker is someone who uses creative DIY to improve the functioning of a system that's why it uses several tools and methods.
In this article we will list some basic working methods of the hacker:
1. Information Collection
The first method is to collect a set of information such as:
IP addressing,
Domain names,
Network protocol,
Activated services,
Server architecture,
Consultation search engines etc.
2. Scan Network
- "Scanner" network (N-Stealth, Nmap) assets or liabilities
Mac: Virex command line
-Read The log file (Log)
3. Identification of vulnerabilities
- "Scanner" vulnerabilities (Messus; ST; N-Stealth)
Specialized web -Sites (SecurityFocus; Insecure.org; CERT) (FrSIRT) The Proof-of-Concept (PoC)
-Listen Network analyzer or frames or "Sniffer" Winpcap; Windump; TCPDump; Ssldump; NeoTrace-Ettercap; Netstat; and many "snifers" without son
4. Operation of a fault
Operating a flaw is either by a malicious program or shell script, often compiled on the target machine, for extension of privileges, system error, etc. You will need some human qualities to succeed exploiting vulnerabilities: patience, perseverance and discretion. This is a stage where you have to manage those computer skills, and I weigh my words.
5. Compromise
To further extension of ROOT privileges, spoofing (impersonation)
6. Install a backdoor and a rootkit
-Installation A backdoor (backdoor) in order to return
-Installation Of rootkits to deceive the legitimate administrator
7. Cleaning
Erases any trace of his passage by removing all created files, and correct Logs.
Remember that the best support for this blog is to love and share our articles! ;)
For more news, thank you for subscribe to the blog newsletter to its RSS feed. Please also have a look at Twitter, Google+ or Facebook for other news.
ConversionConversion EmoticonEmoticon