Saturday, March 5, 2011

Hacking Strategies

Malicious Hacker Strategies :
As there are steps to develop any software so as Every hackers do follow some predefined rules or steps to hack into the system. They are

1>Reconnaissance:- The basic information gathering about the target system.

2> Scanning:- Scanning the target system for open ports and services running on the open ports etc.

3> Gaining Access:- Gaining the actual access of the particular target system by exploiting the system.

4> Maintaining Access:- Keeping the access of the system even after leaving the system so as not to perform all the steps from the scratch.

5>Clearing Tracks:- To remove the footprints if any so as to remain undetected from the victim.

No comments:

Post a Comment