Phase I: Reconnaissance.
It is the stage where hackers gather information and sufficient data to hack began the process, beginning with the IP Adress, and information about Hosting reliable target site. And also programming languages and the quality of supported database at the site, and other information that can be accessed by following some of the roads only Balmokhtrgin himself, and whenever collect more information on the target site, whenever they hack easier and faster process, and vice versa!
Phase II: Scanning & Enumeration
At this stage, hackers start to look for gaps or ports that can be exploited to initiate the process of penetration, the more the site is protected and free from vulnerabilities, the more difficult it hackers Implementation This phase, which is considered a sensitive and fateful, Laket that if he could not find any loophole you will not be able to pass to the other advanced stages of the piece he employs all its capabilities and skills to gain access to one of the gaps in the security system will employ the website target regardless of its importance this gap.
Phase III: Gaining Access.
After the completion of the scanning process successfully and discover the largest possible number of gaps in the target site, hackers at this stage trying to access the control interface for the site, so it becomes has some powers that enable him to check out some of the sensitive data of the site, and no requirement at this stage to reach to the powers of the administration, you as much as they care about the transition from being a regular user of the site to the stage of a person controlled to some extent by!
Stage IV: Maintaining Access!
Now after he had managed to enter the site and controlled to some extent by and access to its database, in various ways trying to hackers at this stage to build a link or several of its own links can which later access interface for the site to control the spectrum in the case of what has been discovered that gap by site managers and downloaded bridging or in the case of what has been discovered is a breakthrough for the site by these managers, because the piece is rushing to do this step so as not to waste his effort in vain and can later easily enter the site, which has breaking through in spite of bridging that gap officials from party site, called the control program upon which hackers in these client b Shell.
The last stage: Covering Tracks.
Managers of large sites, which are heavily exposed to penetrate, they periodically checks the activities that occur on the site by users, therefore, if we detect suspicious activity or raises doubts it inevitably increases the procedures and security precautions by them, and also they can in state whether they discovered that someone had infiltrated the site, they will punished for the attack in some way, or at least prevented the possibility of renewed access to the interface for the site and a high price what they fail to control this in the case of whether the hackers hack installed on the site. And frankly this stage is marked by professional hackers from other hackers, if the hackers hacked site or certain security system and left some breakthrough triggered it remains in permanent fear and concern reached.
Share this