The steps for hacking


A hacker is someone who uses creative DIY to improve the functioning of a system that's why it uses several tools and methods.

In this article we will list some basic working methods of the hacker:

1. Information Collection

The first method is to collect a set of information such as:

IP addressing,
Domain names,
Network protocol,
Activated services,
Server architecture,
Consultation search engines etc.

2. Scan Network

- "Scanner" network (N-Stealth, Nmap) assets or liabilities


Mac: Virex command line

-Read The log file (Log)

3. Identification of vulnerabilities

- "Scanner" vulnerabilities (Messus; ST; N-Stealth)

Specialized web -Sites (SecurityFocus; Insecure.org; CERT) (FrSIRT) The Proof-of-Concept (PoC)

-Listen Network analyzer or frames or "Sniffer" Winpcap; Windump; TCPDump; Ssldump; NeoTrace-Ettercap; Netstat; and many "snifers" without son

4. Operation of a fault

Operating a flaw is either by a malicious program or shell script, often compiled on the target machine, for extension of privileges, system error, etc. You will need some human qualities to succeed exploiting vulnerabilities: patience, perseverance and discretion. This is a stage where you have to manage those computer skills, and I weigh my words.

5. Compromise

To further extension of ROOT privileges, spoofing (impersonation)

6. Install a backdoor and a rootkit

-Installation A backdoor (backdoor) in order to return

-Installation Of rootkits to deceive the legitimate administrator

7. Cleaning

Erases any trace of his passage by removing all created files, and correct Logs.
Remember that the best support for this blog is to love and share our articles! ;)

For more news, thank you for subscribe to the blog newsletter to its RSS feed. Please also have a look at Twitter, Google+ or Facebook for other news.
Previous
Next Post »