Phases of Hacking

Vishnu Shivalal P
2 min readOct 17, 2022

Hacking is a five step process. If a hacking has to be successful, the steps referred here has to be done. The phases of hacking consists of Reconnaissance, Scanning, Gaining Access, Maintaining Access and Covering Access. Each phase of hacking is depended on its previous phase.

1. Reconnaissance

Reconnaissance is the act of gathering preliminary data or intelligence on your target. The data is gathered in order to better plan for your attack. It can be performed actively or passively (meaning that your recon is being performed through an intermediary).

2. Scanning

This phase requires the application of technical tools to gather further intelligence on your target, but in this case, the intel being sought is more commonly about the systems that they have in place. A good example would be the use of a vulnerability scanner on a target network.

3. Gaining Access

This phase requires taking control of one or more network devices to either extract data from the target, or to use that device to then launch attacks in other targets.

4. Maintaining Access

This phase requires taking the steps involved in being able to be persistently within the target environment in order to gather as much data as possible. The attacker must remain stealthy in this phase, so as to not get caught while using the host environment.

5. Covering Access

This phase can also be called Covering Tracks. In this phase the attacker takes the steps necessary to remove all semblance of detection. Any changes that were made, authorizations that were escalated etc. All must return to a state of non-recognition by the host network’s administration.

--

--

Vishnu Shivalal P
Vishnu Shivalal P

Written by Vishnu Shivalal P

Cyber Security Engineer | Bug Hunter | Security Researcher | CTF Player | PenTester | Security Enthusiast | TryHackMe Top 1% www.linkedin.com/in/vishnushivalalp

No responses yet