Hacking has become an comman term now a days between the youngsters specially in newbies. They get excited by seeing the stuffs in some science fiction movies which shows them hacking by pressing the keyboards faster and within seconds the hacker get access to the computer. But thats not true..!! Hacking into someones computer or network require some sort of steps which should be follows these steps include:-
Casing the Target
Firstly identify the target in which you want to get access. It can be a computer in the network in which you are connected . Lets take an example, Suppose you are Colleges newbie and want to upgrade your attendance by getting access to the colleges main server computer, so for doing this you should first identify the computer by knowing its IP Address. and you can get it easily if you are connected to same network.
Identifying Target Components
Now after getting the victims IP identify the component on which you are going to perform the attack, in short you have to scan for any port open and a service/software should be running on that specific port. After that scan for any vulnerability in that software which users that service through which you are performing the attack. Lets take an example:- You are connected in a network of 10 computer and you want to perform an attack on a specific computer which has a port 3389 open which is default port for RDP connection which is remote desktop connection then you will going to find the vulnerability in windows ( suppose you are going to attack windows os ) for RDP connection. Then after getting the vulnerability use standard tools to exploit it.
Obtain Access
For obtaining the access to the victims computer you should have the password of the victims computer profile which you can get by two methods either the victims trust on you, and he tells himself the password to you, who's chances are less or you can see him by entering the password, and the another method is to go for Brute Force Attack. and get the password.
Obtaining Privileges
After getting access to any of the profile of the victims computer, its your good luck that you might by-pass the most privilege profile of the victim other if you get access to the normal profile of the computer through register keys you can get the password of the most privilege user easily.
0 comments:
Post a Comment