Wednesday, August 24, 2016

Ethical hacking Part 3 (Steps for hacking)

   Hey everyone I am back with some hacking knowledge. As I promised today we are learning the steps for a successful hack. So here are the steps:

STEP 1: Footprinting  :
                    Footprinting (also known as reconnaissance) is the technique used for gathering information about computer systems and the entities they belong to. To get this information, a hacker might use various tools and technologies. This information is very useful to a hacker who is trying to crack a whole system.  This information might be IP address, vulnerable port or some more information about the system.

STEP 2 : Gaining access :
                    Next step is gaining access to the system. For gaining access to the system you might attack the victim IP or you may execute RAT file in the system. This will let you access the victim system.

STEP 3 : Maintaining access :
                    Gaining access is not enough your must maintain the access to the victim system. You can do it by installing backdoor in the victim system. After installing backdoor in the victims system you can access it any time you want.


So, these are the steps for successful hacking. So the introduction to hacking part is over now in the next post I will show you how to hack victim pc using metasploit. Thanks for the view comment your queries below and follow my blog for more.

No comments:

Post a Comment