1 Matching Annotations
  1. Dec 2019
    1. ReconnaissanceFirst, we try to gather as much information as possible. Because our success depends on this information. Here we do search about the target, Find the social information, Find the technology used. We do it manually and automatically.Vulnerability AnalysisWhen we will have enough information, we start vulnerability analyzing. For example, In this step, we figure out what Ports are open, What operating system the target is using and the version of software used.Here we use some commercial, open-source tools and manually to find the exploitable vulnerability.ExploitationOur goal is not just to find a vulnerability. We have to get access to you and do the thing you wanted us to do. Successfully exploitation completely depends on the previous two-phase. It depends on how hard we worked there.For example, If we found an overflow type vulnerability, then here we write an exploit. In this step, we need more hard to exploit the vulnerability because most of the thing we need to do manually.Post Exploitation and Covering TracksThe job is not done yet. After successfully hacking(Exploiting) into the system. Our future access depends on this phase. Here the hacker will install an advanced backdoor. And clean all the logs very carefully.