Various Phases of the Hacking Cycle Flashcards
In the correct order, list the phases of the ethical hacking lifecycle.
The ethical hacking lifecycle goes through the following phases: reconnaissance, scanning, gaining and maintaining access, clearing tracks and reporting.
Explain the main tasks performed by an ethical hacker in the clearing tracks phase of the ethical hacking lifecycle.
In this phase, the ethical hacker performs several tasks to ensure that all traces of their activities during the testing are removed, and the system is left in the same state as before the testing. The main tasks performed by an ethical hacker in the Clearing Tracks phase are:
Removing tools and files: The ethical hacker removes all tools and files used during the testing from the system to eliminate any evidence of their activity.
Deleting log files: The ethical hacker deletes all log files that may contain information about their activity on the system.
Restoring system settings: The ethical hacker restores the system settings to their original state to ensure that the system functions as intended.
Closing user accounts: The ethical hacker closes any user accounts that they may have created during the testing to prevent unauthorized access.
Removing backdoors: If the ethical hacker has created any backdoors during the testing, they remove them to ensure that the system is not vulnerable to future attacks.
Verifying cleanup: Finally, the ethical hacker verifies that all traces of their activity have been removed and the system is in the same state as before the testing.
Demonstrate the main contributions of the reconnaisance phase of the ethical hacking lifecycle.
The reconnaissance phase of the ethical hacking lifecycle involves gathering information about the target system or network. The main contributions of this phase are as follows:
Information gathering: provides the ethical hacker with a detailed understanding of the target system or network. This includes identifying the target’s IP address, domain name, and other relevant information, as well as any vulnerabilities or weaknesses that could be exploited.
Footprinting and profiling: also includes footprinting and profiling, which involves gathering information about the target system or network from publicly available sources, such as social media, online forums, and search engines. This information can be used to identify potential attack vectors and to tailor the ethical hacking approach to the target.
Passive reconnaissance: Finally, the reconnaissance phase includes passive reconnaissance, which involves gathering information about the target system or network without actively probing it. This can include monitoring network traffic, analyzing system logs, and researching the target organization’s security policies and procedures.
Differentiate between scanning and gaining access.
Scanning is the process of actively probing a target system or network to identify open ports, services, and other information. The purpose of scanning is to identify potential vulnerabilities and weaknesses that could be exploited to gain unauthorized access to the target system or network. Scanning can involve a range of techniques, including port scanning, vulnerability scanning, and service enumeration. Scanning is a non-intrusive phase of the ethical hacking process, as it does not involve attempting to gain access to the target system or network.
Gaining access, on the other hand, involves exploiting vulnerabilities or weaknesses in the target system or network to gain unauthorized access. This typically involves attempting to bypass security controls, such as authentication mechanisms, and gaining a foothold on the target system or network. Once access has been gained, the ethical hacker may attempt to escalate their privileges and move deeper into the target system or network. Gaining access is an intrusive phase of the ethical hacking process, as it involves attempting to breach the target system or network.