1 00:00:00,390 --> 00:00:02,680 Now it's time to talk about hacking methodology. 2 00:00:03,240 --> 00:00:08,400 Now, the first thing which is the footprinting now, it is the process of using massive methods of 3 00:00:08,400 --> 00:00:14,100 gaining information about the target system prior to performing that, that it can reveal vulnerabilities 4 00:00:14,100 --> 00:00:19,050 of the target system and improve the ease with which they can be exploited. 5 00:00:19,350 --> 00:00:23,850 Now, various methods are employed for footprinting for scanning. 6 00:00:24,120 --> 00:00:30,390 It is the process of taking information obtained from the footprint phase in order to target the attack. 7 00:00:30,390 --> 00:00:36,450 More precisely, and some of the methods used in this phase are both scans being sweeps, operating 8 00:00:36,450 --> 00:00:41,050 system detection, observation of facilities used by the target and so on. 9 00:00:41,790 --> 00:00:48,030 Now, if we have enumeration, it is the process of extracting more detailed information about the information 10 00:00:48,030 --> 00:00:52,510 obtained during the scanning phase to determine its usefulness. 11 00:00:53,220 --> 00:01:01,830 Some of the methods used in this state are user accounts, enumeration, S&P Enumeration, Unix, Linux 12 00:01:01,830 --> 00:01:09,810 enumeration and the enumeration, A.P. Enumeration, MPB enumeration, DNS enumeration and so on. 13 00:01:09,840 --> 00:01:10,250 OK. 14 00:01:11,640 --> 00:01:17,430 Now, system hacking, it is the process of planning and executing the attack based on the information 15 00:01:17,430 --> 00:01:23,640 obtained in the previous phases in this phase, the attacker before the actual hacking process using 16 00:01:23,640 --> 00:01:24,390 hacking tools. 17 00:01:25,490 --> 00:01:31,070 We have this condition of privilege, it is a process of obtaining privileges that are granted to higher 18 00:01:31,070 --> 00:01:37,760 privileges, accounts like that, or the admin then the attacker broke into originally because of this 19 00:01:37,760 --> 00:01:43,760 step is to move from lowly accounts such as this account all the way up to administrator orat. 20 00:01:44,690 --> 00:01:46,210 Now we have covering trucks. 21 00:01:46,850 --> 00:01:52,730 It's the process of removing any evidence of that Dacos presence in the system and that Dukkha just 22 00:01:52,820 --> 00:01:59,140 look finds and removes other evidence needed for the owner of the system to admit that an attack. 23 00:02:01,200 --> 00:02:08,070 Planting back doors, it's the process of securing unauthorized remote access to a computer so the attacker 24 00:02:08,070 --> 00:02:14,190 can access the system later without being detected, and those are usually a computer programs that 25 00:02:14,190 --> 00:02:18,230 give an attacker the remote access to a targeted computer system.