Get the latest free browsing cheats, software, network tricks and money making tips

The Complete Ethical Hacking Course- Beginner to Advanced! (Chapter One)

Remember Sharing is caring!

Hackers Wallpaper HD By Pcbots - Part-IV ~ PCbots Labs (Blog)


How to Hack Wi-Fi | Digital Trends
This is the first step of Hacking. It is also called as Footprinting and information gathering  Phase. This is the preparatory phase where we collect as much information as possible about the target. We usually collect information about three groups, 



  3.People involved

There are two types of Footprinting:

Active: Directly interacting with the target to gather information about the target. Eg Using Nmap tool to scan the target

Passive: Trying to collect the information about the target without directly accessing the target. This involves collecting information from social media, public websites etc.


  NMAP - A Best Network Scanning Tool for Ethical Hacker in ...
Three types of scanning are involved:
  • Port scanning: This phase involves scanning the target for the information like open ports, Live systems, various services running on the host.
  • Vulnerability Scanning: Checking the target for weaknesses or vulnerabilities which can be exploited. Usually done with help of automated tools.
  • Network Mapping: Finding the topology of network, routers, firewalls servers if any, and host information and drawing a network diagram with the available information. This map may serve as a valuable piece of information throughout the haking process.

                                                     3.Gaining access

Hacker Gaining Access | Photo by CafeCredit under CC 2.0 ...
This phase is where an attacker breaks into the system/network using various tools or methods. After entering into a system, he has to increase his privilege to administrator level so he can install an application he needs or modify data or hide data.


                                                       4.Maintaing access

Tracking the People Behind Botnets: A List of Top 20 IoT ...
Hacker may just hack the system to show it was vulnerable or he can be so mischievous that he wants to maintain or persist the connection in the background without the knowledge of the user. This can be done using Trojans, Rootkits or other malicious files. The aim is to maintain the access to the target until he finishes the tasks he planned to accomplish in that target.

  5.Clearing tracks


No thief wants to get caught. An intelligent hacker always clears all evidence so that in the later point of time, no one will find any traces leading to him. This involves modifying/corrupting/deleting the values of Logs, modifying registry values and uninstalling all applications he used and deleting all folders he created. 


 Guys, this is it for today from Creative Mind. I hope you will keep visiting. Next chapter will be uploaded tomorrow.

Remember Sharing is caring!


* indicates required
Updated: June 12, 2019 — 6:15 am

Leave a Reply

Your email address will not be published. Required fields are marked *

PRIME CREATIONS © 2020 Frontier Theme