From hackread.com
Last week, Capital One breach shocked the IT security community after it was revealed that a wannabe hacker was able to steal and brag about personal and financial details of over 106 million users. The incident also highlighted the fact that penetration testing has become more critical than ever.
If you’ve had the chance to lately go through an ethical hacking course, it is likely that you’ve come across the following 5 steps as an outline of the entire penetration testing process:
If you’ve had the chance to lately go through an ethical hacking course, it is likely that you’ve come across the following 5 steps as an outline of the entire penetration testing process:
- Reconnaissance – Collecting maximum information about the target to make one’s attack process easier,
- Scanning – Identifying open ports, the services running on the host and any other vulnerabilities that can be detected,
- Gaining Access – Actually doing the attack using different techniques which may range from social engineering to purely technical exploits,
- Maintaining Access – Making sure that you have a backdoor that allows you continued access and does not alert the target,
- Covering Tracks – No one wants the FBI on their door, not even the great Kevin Mitnick