Ethical Hacking Process | Phases of Ethical Hacking | 5 Phases of Ethical Hacking | Hacktech beast


Here we are going to explain you the various Processes or Steps in Ethical Hacking.

Ethical Hacking is also has a set of different or various phases which helps the hackers to make a well structured ethical hacking attacks on victims computer system and Networks.
Various security training manuals or guides can define the process of ethical hacking in different ways, but according to me as a Certified Ethical Hacker (CEH), the whole process of steps can be defined into only six phases.



                        Reconnaissance

It is the process by which the hacker or attacker can gathers informations about a target. In Reconnaissance phase the attacker used active or passive means to gather informations.

The common tools that are widely used in this process are :- 
• Nmap
• Hping
• Maltego
• Google Dorks.       


                               Scanning 

Scanning is the process in which the attackers or hackers begins to actively probe a target machine or Network for Vulnerabilities that can be exploited. 

The common tools that are widely used in this process are :-
• Nessus 
• Nexpose 
• Nmap


                           Gaining Access


In the process of gaining access, the vulnerability is located in a system or network and the Attacker or Hacker attempt to exploit it in order to enter in the network or system.

The common tool which are used in this process is :-
• Metasploit


                          Maintaining Access

It is the process in which the attacker or hacker has already gained access into a system and after this the attacker or hacker can install few backdoors in order to enter into the system when he needs acccess in this owned sytem in future.

The Suggested tool for this process is :-
• Metasploit 


                             Clearing Tracks

Clear tracks is not an ethical process actually it is a unethical process in which the hacker can delete all the logs of all activities that occurs during hacking process.


                              Reporting 

The last step in ethical hacking process is Reporting. In this process the attacker or hacker complies a report with his findings and the job that was done such as the tools used during hacking, the success rate of hacking, vulnerabilities found, and also the whole exploit processes.


• NOTE :-  The above processes are not standard. So, you can adopt a different tools and processes according to your techniques that you feel comfortable.



You can also join us on :- 




Post a Comment

0 Comments