Hi, please see the attached paper. Have a look at it and in case of any edit, please let me know. Otherwise, it is my pleasure to have you as my buddy now and future. Until the next invite, Bye!
Running Head: ETHICAL HACKING
A. Hacking Methodology and Phases
The hacking process, like any other activity, requires an individual to follow a logical
series of steps designed to take advantage of the vulnerabilities of the targeted victim and gain
access to their systems. Reconnaissance, the first phase in the methodology, involves two stages,
the active and passive stages. The Passive phase includes collecting information about the target,
like the range of IP address and records of DNS while keeping interaction at the lowest. The next
step involves the hacker actively investigating the mark using features such as Zenmap to ensure
the attack is precise. This information can also be subject to authentication, enumeration stage,
where the attacker determines the usefulness of the collected data.
After carefully considering a plan, the hacker then decides to execute the penetration
process using the available tools. This exploitation procedure shortly precedes the escalation of
privilege where the hacker seeks to establish superuser by moving up the levels from a low-level
account to becoming the administrator. At this particular point, the hacker then decides to launch
persistence by creating backdoor channels, which are programs designed to grant the attacker
unapproved, remote access to the user's system later on, in case of a quick disconnection. It is at
this juncture, that the infiltrator commits the real intended act, corrupting, encrypting or, stealing
data from the victim's system (Mukhopadhyay, & Nath, 2014).
The last stage of the hacking process will involve covering the digital footprints and
signatures left behind during the penetration. This phase is crucial both to penetration testing and
criminal hacking, as it consists of the protection of the vulnerabilities that increased the chances
of success of the exploitation. If a breach gets discovered the vulnerabilities, mediation may lead
to the detection of vulnerable sections of the structure. Therefore, this last stage centers on the
purging of log files to remove evidence that evidence the occurrence of any breach.
For an ethical hacking exercise to be legal and within the set boundaries of ...