The following are the five phases of hacking-
Surveillance is an original preparing phase for the bushwhacker to get ready for an attack by gathering information about the target before launching an attack using different tools and ways. The gathering of information about the target makes it easier for an bushwhacker, indeed on a large scale. Also, on large scale, it helps to identify the target range.
In Passive Surveillance, the hacker is acquiring information about the target without interacting with the target directly. An illustration of unresistant surveillance is public or social media searching for gaining information about the target.
Active Surveillance is gaining information by acquiring the target directly. Exemplifications of active surveillance are via calls, emails, help office, or specialized departments.
The scanning phase is apre-attack phase. In this phase, the bushwhacker scans the network by information acquired during the original phase of surveillance.
Scanning tools include Dialler, Scanners similar as Port scanners, Network mappers, customer tools similar as clunk, as well as vulnerabilities scanner. During the scanning phase, the bushwhacker eventually fetches the information of anchorages including harborage status, operating system information, device type, live machines, and other information depending upon scanning.
The gaining access phase of hacking is the point where the hacker gets control over an operating system, operation, or computer network. Control gained by the bushwhacker defines the access position similar as operating system position, operation position, or network- position access. Ways include word cracking, denial of service, session kidnapping or buffer overflow, and others are used to gain unauthorized access. After penetrating the system; the bushwhacker escalates the boons to gain complete control over services and processes and compromise the connected intermediate systems.
Maintaining Access/ Escalation of Boons
The maintaining access phase is the point when an bushwhacker is trying to maintain access, power & control over the compromised systems. Also, the bushwhacker prevents the proprietor from being possessed by any other hacker. They use Backdoors, Rootkits, or Trojans to retain their power. In this phase, an bushwhacker may steal information by uploading the information to the remote garçon, download any train on the occupant system, and manipulate the data and configuration. To compromise other systems, the bushwhacker uses this compromised system to launch attacks.
An bushwhacker must hide his identity by covering the tracks. Covering tracks are those conditioning which are carried out to hide the vicious conditioning.
Covering tracks is most needed for an bushwhacker to fulfill their intentions by continuing the access to the compromised system, remain undetected & gain what they want, remain unnoticed, and wipe all substantiation that indicates his identity. To manipulate the identity and substantiation, the bushwhacker overwrites the system, operation, and other affiliated logs to avoid dubitation.