Processes in Ethical Hacking and Reconnaissance

Last updated on Nov 22 2021
Deepali Gupta

Table of Contents

Processes in Ethical Hacking and Reconnaissance

Like all good projects, ethical hacking too features a set of distinct phases. It helps hackers to form a structured ethical hacking attack.

Different security training manuals explain the method of ethical hacking in several ways, except for me as a licensed Ethical Hacker, the whole process are often categorized into the subsequent six phases.

image1 13

Reconnaissance

Reconnaissance is that the phase where the attacker gathers information a few target using active or passive means. The tools that are widely utilized in this process are NMAP, Hping, Maltego, and Google Dorks.

Scanning

In this process, the attacker begins to actively probe a target machine or network for vulnerabilities which will be exploited. The tools utilized in this process are Nessus, Nexpose, and NMAP.

Gaining Access

In this process, the vulnerability is found and you plan to exploit it so as to enter into the system. the first tool that’s utilized in this process is Metasploit.

Maintaining Access

It is the method where the hacker has already gained access into a system. After gaining access, the hacker installs some backdoors so as to enter into the system when he needs access during this owned system in future. Metasploit is that the preferred tool during this process.

Clearing Tracks

This process is really an unethical activity. it’s to try to to with the deletion of logs of all the activities that happen during the hacking process.

Reporting

Reporting is that the last step of finishing the moral hacking process. Here the moral Hacker compiles a report together with his findings and therefore the job that was done like the tools used, the success rate, vulnerabilities found, and therefore the exploit processes.

Quick Tip

The processes aren’t standard. you’ll adopt a group of various processes and tools consistent with your techniques that you simply are comfortable with. the method is of least significance as long as you’re ready to get the specified results.

Ethical Hacking – Reconnaissance

Information Gathering and going to know the target systems is that the first process in ethical hacking. Reconnaissance may be a set of processes and techniques (Footprinting, Scanning & Enumeration) wont to covertly discover and collect information a few target system.

During reconnaissance, an ethical hacker attempts to collect the maximum amount information a few target system as possible, following the seven steps listed below −

  • Gather initial information
  • Determine the network range
  • Identify active machines
  • Discover open ports and access points
  • Fingerprint the OS
  • Uncover services on ports
  • Map the network

We will discuss intimately of these steps within the subsequent chapters of this tutorial. Reconnaissance takes place in two parts − Active Reconnaissance and Passive Reconnaissance.

Active Reconnaissance

In this process, you’ll directly interact with the pc system to realize information. This information are often relevant and accurate. But there’s a risk of getting detected if you’re planning active reconnaissance without permission. If you’re detected, then system admin can take severe action against you and trail your subsequent activities.

Passive Reconnaissance

In this process, you’ll not be directly connected to a computing system . This process is employed to collect essential information without ever interacting with the target systems.

So, this brings us to the end of blog. This Tecklearn ‘Process in Ethical Hacking and Reconnaissance’ blog helps you with commonly asked questions if you are looking out for a job in Cyber Security. If you wish to learn Ethical Hacking and build a career in Cyber Security domain, then check out our interactive, Certified Ethical Hacker Training, that comes with 24*7 support to guide you throughout your learning period. Please find the link for course details:

https://www.tecklearn.com/course/certified-ethical-hacker-training/

Certified Ethical Hacker Training

About the Course

Tecklearn’s CEH certification training course provides you the hands-on training required to master the techniques hackers use to penetrate network systems and fortify your system against it. In this training, you will master how to identify security vulnerabilities by inspecting network infrastructures and defend the malicious hacker with essential tools and techniques, advanced network packet analysis and system penetration testing techniques to build your network security skill-set and prevent hackers. We will train you on the advanced step-by-step methodologies that hackers actually use such as writing virus codes and reverse engineering so you can better protect corporate infrastructure from data breaches.

Why Should you take Certified Ethical Hacker Training?

  • The average salary for a Cybersecurity Specialist is $110,881 per year in the United States and INR 900,000 per year in India – Indeed.com
  • Global Cybersecurity industry is estimated to cross US$ 220 billion by 2021.
  • Today cyber security is one of the most important aspects for any organization. In today’s digitally-driven world every organization needs professionals who can keep the hackers at bay. Hence the salaries for certified ethical hackers are among the best in the industry.

What you will Learn in this Course?

Introduction to Ethical hacking

  • Scope of ethical hacking
  • Enterprise information security architecture
  • Introduction and PCI Data Security Standard Overview
  • Role of Security and Penetration Testers
  • Vulnerability assessment
  • Various cyber security laws
  • Penetration testing

Various aspects of Information Security

  • Information security attacks
  • OS attacks
  • Application level attacks
  • Phases and Concepts of Hacking
  • Information Security Law and Standards

System Hacking

  • What is System Hacking
  • Goals of System Hacking
  • Understanding the certified ethical hacker methodology
  • About Kali Linux
  • Hands On

Technology Standards

  • Introduction to F5 Technology and Terms
  • POS (Point of Sale ) , mPoS
  • What is GLBA Compliance
  • OWASP
  • Site monitoring Tools
  • Introduction to PCI DSS Standard

Semantics and Introduction to Footprinting

  • What is Semantics
  • Fuzzy Logic
  • Footprinting

Threats

  • Types of Threats
  • Threats against the Application
  • Threat modelling
  • Hands on

Threat modelling

  • Threat modelling with STRIDE model
  • Ways to Find Security Issues
  • Penetration Testing Tools
  • Modelling Models – Whiteboard Diagrams, Brainstorming, Structured Diagrams etc.
  • Trust Boundaries
  • Threat Trees
  • DREAD Model

Example of Attack

Vulnerability Scanning Tools

  • OpenVAS
  • Wapiti
  • Burp Suite Community
  • Metasploit

Threat Modelling with Different models

  • Various Threat Models
  • PASTA Model in Depth

Advanced concepts like network packet analysis

  • Network scanning
  • How to scan the network, overview of scanning
  • WireShark
  • Sniffing attacks
  • File Signature

Got a question for us? Please mention it in the comments section and we will get back to you.

 

0 responses on "Processes in Ethical Hacking and Reconnaissance"

Leave a Message

Your email address will not be published. Required fields are marked *