Breaking

Thursday, 9 May 2013

Real hacking steps

*Information gathering
*PORT scanning
*OS fingerprinting
*Banner grabbing
*Vulnerability assessment
*Search and Build Exploits
*ATTACK
*Maintaining Trojans and other virus
*Covering TRACKS

THESE ARE THE METHODS FOR REMOTE HACKING

LETS STUDY THEM IN DEEP

*INFORMATION GATHERING:
In this process we will gather maximum information of victim for example
Gathering victim IP
Foot printing the victim (www.who.is)
Gathering physical information of website (www.whatismyipadress.com)
By Googling the website

*PORT SCANNING

Ports are the medium of communication between two computers or IP they are usually 16 bit

Default ports
There are some default ports I would post them but later

What are port scanner?

Port scanners scan for the open ports on to victim server

BEST PORT SCANNER?

NMAP IS THE BEST PORT SCANNER

While BANNER GRABBING AND OS FOOTPRINTING can be performed with NMAP

-------HACKER MANISH ------------

1 comment: