Skip to main content

How To Perfrom an Successful Hacking Attack






As we know That Phases of hacking plays an very important role in Successfully  Exploiting The System
so itz important to Fallow The Complete Set of Phases To Get high Chances of Exploiting The target system
So letus Start:

1St Step

FOORPRINTING
-=-==-==-=-=-=




    Information gathering

    Determining the range of the network

    Identifying active machines

    Identifying open ports and access points

    OS fingerprinting

    Fingerprinting services

    Mapping the network

TOOLS USED
-=-==-=-=-=


    Whois

    SmartWhois

    NsLookup

    Sam Spade


Other Ifo to grab
-=-=-=-=-=-=-=-==-

    Company contact names, email addresses and phone numbers

    Companies Deals and other parties involved.

    News on mergers and acquisition

    Links to other company-related sites

    Company's privacy policies
======================================================================================================================================


SCANNING
-=-=-=-==
    scanning Open ports
    Scanning OS
    Scanning Services on Ports
    scanning Http Methods
    Scanning Cgi-scripts
    Scanning Versions of Services



Tools USed
=-=-=-=-=-


    NMap

    Ping

    Traceroute

    Superscan

    Netcat

    NeoTrace

    Visual Route
===================================================================================================================================


ENUMERATION
=-=-=-=-=-=-=


The Goal of enumeration is to get the complete picture of the target:




Techniques USED
-=-=-=-=-=-=-=-=


    Identify vulnerable user accounts and Obtaining Active Directory information

    Using snmputil for Simple Network Management Protocol enumeration

    Employ Windows DNS queries

    Establish null sessions and conneection
======================================================================================================================================

EXPLOITATIOn
=-=-==-==-=-=


Exploiting the Founded Vulnerablities in the systems



TECHNIQUES USED
=-=-==-=-=-=-=-=-=

Attack Against WEB-SERVERS

    SQL Injection

    Cross Site Scripting

    Code Injection

    Session Hijacking

    Directory Traversal

Attack against NETWORKS

    Man in the Middle Attack

    Spoofing

    Firewall Traversal

    WLAN

    ARP Poisoining

Attack against SERVICES

    Buffer Overflows

    Format Strings

    Dos

    Authentication flaws

Comments

Popular posts from this blog

New Working Shopping Site SQLi Dorks

Most Important XSS Cheat Sheet

How to Install Mosh on you Linux ec2 Instance