0% found this document useful (0 votes)
162 views11 pages

Introduction to Hacking Techniques

This document discusses the phases of hacking. It begins by defining hacking and describing different types of hackers - black hat, gray hat, and white hat. It then outlines the typical phases of a hack: 1) reconnaissance/footprinting to gather information, 2) scanning networks and systems to identify vulnerabilities, 3) gaining initial access, 4) maintaining persistent access, and 5) clearing tracks. Specific techniques are provided for each phase such as using search engines, social media, website analysis tools, and social engineering in the reconnaissance phase and port scanning and vulnerability scanning in the scanning phase.

Uploaded by

Fasahal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
162 views11 pages

Introduction to Hacking Techniques

This document discusses the phases of hacking. It begins by defining hacking and describing different types of hackers - black hat, gray hat, and white hat. It then outlines the typical phases of a hack: 1) reconnaissance/footprinting to gather information, 2) scanning networks and systems to identify vulnerabilities, 3) gaining initial access, 4) maintaining persistent access, and 5) clearing tracks. Specific techniques are provided for each phase such as using search engines, social media, website analysis tools, and social engineering in the reconnaissance phase and port scanning and vulnerability scanning in the scanning phase.

Uploaded by

Fasahal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

$INTRODUCTION

INDEX
 What is hacking?
1. Ty p e s o f h a c k e r s
2. Ty p e s o f t e s t i n g
 Phases of hacking
1. Reconnaissance/ Foot printing
• Dorks
• Using Social Media
• We b s i t e f o o t p r i n t i n g ( w h o i s , B u i l t w i t h , R e v e r s e I P l o o k u p )
• Social Engineering
• Counter Measures
2. Scanning
• Port scanning
• Vu l n e r a b i l i t y S c a n n i n g
• Network Mapping
3. Gaining Access
• O WA S P To p 1 0
• SQL INJECTION
• X S S , C S R F, I D O R , F i l e U p l o a d Vu l n e r a b i l i t y, R a t e L i m i t i n g , e t c .
4. Maintaining Access
• Shell upload
5. Cl e a ring Tr a c k s
 My motives
Based on the intent hackers are classified into:
1. Black Hat
2. Gray Hat
3. White Hat
Hacking
White hat hacking is also called penetration testing
Hacking is detecting the vulnerabilities in a or pen testing
network, software or a website; exploiting the
vulnerabilities or defacing the same. Simply put, Types of testing:
it is the unauthorized access to or control over Based on information provided to the hacker:
computer network security systems for some 4. White Box
illicit purpose. 5. Gray Box
6. Black Box

Based on location of hacker:


7. Internal
8. External
Phases Of Hacking

1. Reconnaissance / Foot printing


2. Scanning
3. Gaining Access
4. Maintaining Access
5. Clearing Tracks

6. R e c o n n a i s s a n c e / F o o t p r i n t i n g :

This step involves gathering information of the target through various methods. Few are:
7. Using search engines.
8. Using social media.
9. Website foot printing (whois, builtwith, Reverse IP lookup)
10.Social engineering, etc..
1. Using Search Engines: such as Software running, versions of these
Search engines are equipped with few software’s, operating systems, Sub-directories,
commands that enhance the specificity of search database, scripting information, and other
called dorks. details. Tools used are as follows:
E.g.: insite: , intitle:, intext:, minus (-), inurl:, etc. • web.archive.org
• whois.com
2. Using Social Media: • builtwith.com, etc..
An average active social media user, in their
day-to-day life, upload many posts that give away a 4. Social Engineering:
lot of data regarding their habits, frequently visited This is a method of extracting information
locations, etc. directly from the person related to the target
There are instances of social media being used organization.
to steal the victim’s biometrics.

3. Website Foot printing:


Website Foot printing includes monitoring and
investigating about the target organization’s
official website for gaining data
2. Scanning:

In this phase, hackers seek any


information that can help them perpetrate
attack such as computer names, IP addresses,
and user accounts. In fact, hacker identifies a
quick way to gain access to the network and
look for information. This phase includes
usage of tools like dialers, port scanners,
network mappers, sweepers, and vulnerability
scanners to scan data.

You might also like