What is the initial phase?
Reconnaissance is the initial phase. This step involves gathering information to learn as much as possible about the target.
There are two types of information gathering -
Active and Passive
Passive Ex.
Active Ex.
What is the second phase?
Scanning:
During this stage, hackers use the information they gathered in the reconnaissance phase to scan the target network for more specific information.
Ex. for understanding the difference between the reconnaissance phase and scanning phase:
- Say you are conducting a penetration test on a company; what are the first pieces of information that you would need to know in order to begin scanning the entry point into their network? For instance, if you wanted to test the configuration of a firewall (what can pass through and what cannot), the very least you would need to know is an IP address (or more likely, multiple IP addresses) relevant to that firewall.
Or maybe you’d need something along the lines of an address of which the servers are physically located.
These two particular pieces of information are ones that you would acquire during the reconnaissance phase, and are what you will now act upon in the scanning phase to acquire more specific and applicable data.
In easier terms:
Reconnaissance phase (first stage): - acquire as much relative information and data as possible
Scanning phase (second stage): - using the information you've acquired in the reconnaissance phase, gather even more specific information
What is the third phase?
Gaining access:
This phase involves finding an entry point to the target’s operating system or an application on the system and using it to perform the attack.
What is the fourth phase?
Maintaining access:
This is the phase in which hackers attempt to maintain their admin/root privileges so they can continue to utilize the system.
What is the fifth phase?
Clearing tracks:
This is the final phase. During this step, hackers attempt to hide their activities on the system. They do everything they can to cover their tracks and avoid being caught.
Actions that can be taken to clear your tracks are as follows (but not limited to):
- clearing log files. Just note that you shouldn’t purge everything within a log file, just entries that serve to prove your presence in a system
- you could masquerade your activities behind legitimate programs. By mimicking the activities and behavior of legitimate programs and incorporating your own actions, you could hide yourself.
Ex. Erman’s key logger masquerades itself behind legitimate programs by using the same set of hooks that practically any legitimate program that uses keyboard shortcuts would use. SO, if the antivirus were to detect it as a key logger, it would also have to detect basically all the programs on the system that use keyboard shortcuts