Phases of Hacking : 5
- Gaining Access
- Maintaining Access
- Covering Tracks
$_1. Reconnaissance means gathering information about traget
eg(email, phn_no, victims intrests, etc.,).
$_2. In Scanning where we scan for all possible vulnerabilitys for outdated versions softwares and open ports and more.
$_3. After scanning for loopholes we try to hack into the machine.
$_4. So who wants to get out of the government system. When it is vulnerable so we maintain access so that we can know all what they do.
$_5. Now if it's time to leave the computer because they knows that your in their system now we clear our trackes.