Learn basic stages followed by the hackers to penetrate the sites !!
The field of Hacking of mysterious information areas in which everyone seeks to reveal some of its secrets, and in fact many people are really ignorant of the true meaning of hackers, as they believe that they are bad people always seek to sabotage IT systems and penetrate and make money illegally, this is a misconception about the concept of hackers because it is based on the intention of the hackers and the method employed for his skills, and the right is that hackers are basically a group of super-intelligence programmers having a high degree of familiarity with the skills to deal with different devices
First Stage Poll stage (Reconnaissance).
Is the stage where hackers gather information and sufficient data to begin hack the process, beginning with the IP Address of the the site, and information about Hosting upon which the target site. And also programming languages and the quality of supported database at the site, and other information that can be accessed by following some of the ways of hacker himself, and whenever collecting more information about target site whenever they hack easier and faster process, and vice versa!
Second Stage Scanning stage (Scanning and Enumeration)
At this stage, hackers start to look for gaps or ports (Port), which can be exploited to initiate the process of penetration, the more the site is protected and free from vulnerabilities, the more difficult it hackers faces in This phase, which is considered a sensitive and fateful, as if he could not Find any gap will not be able to pass other advanced stages, he employs all its capabilities and skills to gain access to one of the gaps in the security system will employ the website target regardless of its importance this gap.
Third Stage Achieving access to the system (Gaining Access).
After the completion of the scanning process successfully and discover the largest possible number of gaps in the target site, hackers at this stage trying to access the control interface for the site, As it has some powers that enable him to check out some of the sensitive data of the site, and no requirement at this stage to reach to the powers of the administration, you as much as they care about the transition from being a regular user of the site to the administration user of site!Fourth Stage Install hack and build a link to log in again (Maintaining Access)!
Now after he had managed to enter the site and controlled to some extent by and access to its database, in various ways trying to hackers at this stage to build a link or several of its own links can which later access interface for the site to control the spectrum in the case of Site Managers detect the gap and resolve it,
it is rushing to do this step so as not to waste his effort in vain and can later easily enter the site, which has breaking through in spite of bridging that gap by officials on the site, called the control program upon which hackers in these client by Shell.
Final Stage Delete Items hack (Covering Tracks).
Managers of large sites, which are heavily exposed to penetrate, periodically checks the activities that occur on the site by users, therefore, if we detect suspicious activity or raises doubts it inevitably increases the security precautions by them, and also they can in case If they discovered that someone had infiltrated the site, They will punished for the attack in some way, or at least prevented the possibility of renewed access to the interface of the site control and often fail in this in the case of whether the hackers hack installed on the site. This phase marked by professional hackers from other hackers, if the hackers hacked site or certain security system and left some breakthrough triggered it remains in permanent fear and concern reached.
Learn basic stages followed by the hackers to penetrate the sites !!
Reviewed by David Ayman
on
11:18:00 PM
Rating:
No comments: