The 5 Phases of HackingMarch 28, 2020
In this post, we are going to learn the 5 phases of hacking which is used when hacking into systems. These are the phases which a typical hacker goes through in order to successfully compromise a system.
So the first phase of hacking is reconnaissance. Also known as Information Gathering. It is done to gather as much information about the target as we can.
Since all the data and information that we collect can be very useful in the later phases; this phase is perhaps the most important phase in hacking.
There are various techniques and tools used in the reconnaissance phase. Some of the tools are paid but most of them can be found for free.
Some examples of important information:
- What is the target?
- How do they operate?
- What IP ranges do they have allocated?
- What do they do for mail?
- What do their DNS records show?
- What subdomains do they have?
- What’s going on in their company?
- Who works there?
- How do they assign login names?
- What’s their password policy?
- What do their networks look like?
- Are any of the people who work there vulnerable to social engineering?
- What are there valuable assets?
- Where do they store valuable assets?
Further, reconnaissance is also of two types:
When doing passive reconnaissance we have no direct interaction with the target system. An example of this would be looking at the website of the target company; or checking out the job openings to know what kind of positions are available in that company.
Also, we can do a quick Google search or look up to a public record like WHOIS to get information about the target company’s website.
Now, none of these techniques is direct interaction with the target itself; so these techniques fall under passive reconnaissance.
The scope of what we might want to gather could include not only the systems, hosts and the servers; But it also could include the clients of the company or the target as well as the employees. We could then extract information from the employees with the help of social engineering.
By the way, if you don’t know what social engineering is— it is just a technique of manipulating people into giving some information that they would not normally give. Marketers are very good at manipulating people. They use social engineering all the time while they are marketing their products.
Dumpster diving is another example of reconnaissance that we can use. With dumpster diving, we can get information such as bank statements, ATM slips, phone numbers etc.
When doing active reconnaissance we directly engage with the target. Since active reconnaissance involves interacting directly with the target sometimes it could be difficult. Making telephone calls directly to the target will be an absolute example of active reconnaissance.
Also, using a ping service to check if the target system is responding or not will also be an active reconnaissance.
Now generally, we don’t want to go for active reconnaissance. We never knew what will be on the other side. So it’s better to go for the passive way. If you are using the ping service to ping a server then you are active touching the server.
You could possibly leave your mark behind by doing that which could lead you to trouble.
Some examples of tools:
Now based on the information that we gather via our reconnaissance our next phase is scanning. In the scanning phase, we use different tools to gather more information about the target.
These tools include port scanners, network mappers, ping tools, sweepers, and vulnerability scanners. With these scanning tools, we can gather a good amount of information about the network.
As an example, we will be able to figure out what ports are opened and what ports are closed; we will also be able to get information about what operating systems are being used on the devices; what are the types of devices that are used in the network and much more.
Scanning phase is a little bit more active but there are some passive ways of scanning too. So if we want to figure out what type of operating systems are being used in the network, we may try sending some network traffic to those systems.
The response of all the operating systems towards the network traffic will be different. It is because of the fact that Windows computers respond to the traffic in a different way vs mac computers vs Linux computers.
An example of passive scanning would be sniffing the network traffic. We can use tools like Wireshark to sniff the network traffic.
The result of this phase is that we get to know the entire network infrastructure. We try to make sense of the data collected in this phase and the reconnaissance phase. We then convert all this data into useful information which ultimately gives us a blueprint of the entire network.
Some examples of tools:
3. Gaining Access
So this is the phase were real hacking takes place. In this phase, we try to get into the system using the vulnerabilities discovered during the scanning phase. As an attacker, we try to figure out a path for getting into the network infrastructure to take control of our hands.
We can try different methods to get access to the inside of the network. We can either get access via the network, via a specific operating system or via an application vulnerability.
In the gaining access phase of hacking, we can use different methods like denial of service (DOS) attack or session hijacking. We can make use of the denial of service attack on a system which sometimes exposes the hidden vulnerabilities.
We can then use those vulnerabilities to gain access to the system and complete this phase of the hacking process.
Some examples of tools:
4. Maintaining Access
After penetrating into the network and gaining the access to a system; we now try to maintain that access.
Once we are into the network we would like to return to the same level of access or greater, in the future. So to do that we could implement features such as a rootkit or a Trojan or a backdoor that would continually provide that access in the future.
The longer we try to maintain our control over the compromised system the better it would be. We can then use the compromised system as a source to infect other devices on the network.
And some of the benefits of continuous access could be manipulating data, continuing to see what’s going on in the network over a longer period of time including more time to launch additional attacks.
Some examples of tools:
5. Clearing Tracks
This is the last phase of hacking—covering or clearing our tracks. The goal of this phase is to not be noticed by the IT professionals of the target network.
We try to hide anything malicious that we might have done on the system or on the network.
Because if no one notices that the attacker was there that continuing access and maintaining access is going to be that much easier. Since the attack was unnoticed and uncaught and as a result, no one’s taking additional action to prevent it from happening in the future.
Another aspect of covering one’s tracks would be to make sure that any system logs that are documenting activity on that system either they’re overwritten or destroyed or modified. This is done so that those logs do not reflect the attacker’s activities.
Now one thing to note is that all hackers use this procedure, be it black hat hackers, grey hat hackers and white hat hackers. The only exception is that when the hacker already knows the target or if the hacker is a script kiddie . Post on the steps/procedure commonly used by ethical/white hat hackers coming soon.
How to Protect Yourself and Your Organization in/from Each Step Coming Soon! Stay Tuned!
I will appreciate it, if you take 10 seconds of your time to check out my donations page and donate to the blog and other causes. 40% of the donation goes to buying this blog an official domain name, the rest goes to charity for example the Australian Bush Fire. Any amount received will be shown, from whom and to where it went. I will also include screenshots of inflow and outflow. So go check it out: Donations and donate! You can also buy me something via the wishing list. Thank you and have a wonderful day.
_If you are a regular internet user, guy in tech/cybersec, or you are bank/organization employee/executive i suggest you read these for solutions and more information:_ Kenya’s Cyber Insecurity ,** Cybersecurity & Ethical Hacking Certifications** ,** Hacking/Cybersecurity/IT Jargon** ,** Public Services Portal IFMIS Hacked** ,** Kenya National Development Site Defaced** ,** _Data Protection and Security Tips _** _and _4 simple tips for security
NB: We don’t endorse illegal activities such as acquiring unauthorized access to systems. We in fact want to promote the opposite. We hope to guide young techies interested in cybersecurity and ethical hacking.
- How to Create a Simple Personal URL Shortener
- How to Create a Dev Environment in Windows 10: Part 1
- Resources for Building a Beautiful Progressive JAMstack Blog
- Building a Beautiful Progressive JAMstack Blog Part 2: Day 4 to 7
- Building a Beautiful Progressive JAMstack Blog Part 1: Day 1 to 3