The Only 5 Stages to Become an Ethical Hacker

The Only 5 Steps you need  to Become an Ethical Hacker!!!
Hackers are the computer experts who hack various types of Loop Holes of different platforms.
They know the internal working and design of a computer as well as how to operate. And then misuse the system for illicit or illegal purposes.

Why do we Need Ethical Hacker ?

Every system or network that is vulnerable to malicious hackers and their techniques need equally effective counter-measures.

While considering system protection against hackers, an ethical hacker must be consulted.

An ethical hacker worked just like a hacker using the same methods, and techniques an ethical hacker would.

With the only difference being their trustworthiness.

Ethical hackers test the security of a system and identify weak points so that they can be fixed.
Following are the reasons why ethical hackers must be hired by every IT organization:

  • Unlike black hat hackers, ethical hackers take the owner’s permission to break the system security. They are also called white hat hackers. Trustworthy ethical hackers are appointed by the organization. To identify loopholes in the system in order to protect it from any external attack.
  • Apart from regular duties, ethical hackers perform many other tasks such as finding vulnerabilities and seeking counter-measures to block them. They use various tools such as Nmap awnd Nessus to perform port scanning and find open ports in a system. They perform detailed analyses on vulnerabilities that can affect the ports and find solutions for them. It also checks the patch installation to protect it from malicious hackers.
  • They work with social engineering concepts such as dumpster diving. This concept is used to perform an unsystematic search, to find and delete stored passwords, charts, any sticky notes with confidential data which can be used to perform an attack.
  • Ethical Hackers are responsible for designing and maintaining Intrusion Detection Sytems, Firewall, and Intrusion Prevention Systems. They are also responsible for designing strategies like cracking wireless encryption, sniffing networks, bypassing and hijacking web servers and applications.
  • They detect system performance to figure out the strengths of the systems, verify the organization’s security infrastructure and security policies.
Ethical Hacker

Types of Hacker around the World !!!

  • Script Kiddies
  • White Hat Hackers
  • Black Hat Hackers
  • Grey Hat Hackers
  • Green Hat Hackers
  • Red Hat Hackers
  • Hacktivists
  • Cyber Terrorists
Hackers around the world

Stages Involved in hacking:

  1. Reconnaissance
  2. Scanning and Enumeration
  3. Gaining Access
  4. Maintaining Access and Placing Backdoors
  5. Covering Tracks or Clearing Logs


It is a pre-attack phase which is nothing but a systematic attempt. To locate, identify, collect and record information about the target system or network. Through this phase, hackers try to identify and gather as much information as they can about the target system or network.

There are two types of reconnaissance :
Passive reconnaissance and Active reconnaissance


It is a process to collect information about a potential victim without their knowledge, for example, a password is stolen by a hacker without the knowledge of the victim. Passive reconnaissance is a part of malicious hacking where the victim is observed and impersonated by the hacker in the process of data collection.

However, most of the time the hacker uses internet search or Google search to gain information about the potential victim. This process is also known as information gathering. Social engineering can be considered to be a passive information-gathering method.

Another way of performing passive reconnaissance is through sniffing. It is used to collect useful information about the network, such as IP address, along with its ranges. naming conventions, hidden servers or networks, and other services available on the network. With the help of sniffing, a hacker can monitor data traffic such as transaction times and data packet routing.


It is the process of collecting system information for the purpose of hacking where the hacker uses system information to gain unauthorized access into the computer system. System analysts and programmers also use active reconnaissance to test the security of the system or the network and identify potential vulnerabilities.

Active reconnaissance is usually used to identify network hosts, IP addresses, and services on the network. Both passive and active reconnaissance can help a hacker in gathering critical information about the victim that is usually used at the time of an active hack.


It incorporates the second pre-attack phase where the hacker uses the information collected in the reconnaissance phase and to study and analyze the network.

After collecting enough information during the reconnaissance phase to understand the business and workflow ad hacker initiated the process of scanning perimeter and internal network devices to find weaknesses or vulnerabilities such as open ports open services vulnerable application, weak protection in data transfer, and LAN/WAN equipment


The actual process of breaching system security begins from this phase, After the completion of the reconnaissance and scanning phase, ad hacker analyses the network of the target victim with the help of data collected. Vulnerabilities identified in phase 1 and phase 2 are now exploited to gain access.

Denial of Service, session hijacking,stack-based buffer overflows is some of the exploits used by the hackers to gain access.


After gaining access within a system or a network, a hacker maintains this access for future attacks. therefore they make the changes in the system in such a way that no other hackers or security personnel can access the system.

The hacker uses backdoors rootkits and trojans to keep this access exclusive. A hacker also uses automated tools and scripts to remove all the evidence of an attack from the system.


This is the final phase where a hacker uses automated tools and scripts to remove all evidence of an attack from the system. A hacker removes and destroys the evidence such as log files, intrusion detection, or system alarms that may reveal any signs of tampering.

This not only helps in evading any possible backtracks by the host network administrators but also can avoid facing any trials or legal repercussions. Several types of investigative tools have been developed to identify hackers and creakers in this phase.

By Mastering These 5 steps anyone could easily find the LOOPHOLE of the various systems!

Related Topics:


No Comments

Leave a Comment