Othmane Moutaouakkil
LinkedInGitHub
  • Introduction
  • OSCP Journey
    • HTB
      • HTB Linux Boxes
      • HTB Windows Boxes
  • Write-Ups
    • TCM Security
      • Practical Ethical Hacking
        • Networking Refresher
        • The Ethical Hacker Methodology
        • Information Gathering (Reconnaissance)
        • Scanning & Enumeration
        • Vulnerability Scanning with Nessus
        • Exploitation Basics
        • New Capstone
        • Active Directory (AD)
          • AD Overview
          • AD Lab Build
          • Attacking AD: Initial Attack Vectors
          • Attacking AD: Post-Compromise Enumeration
          • Attacking AD: Post-Compromise Attacks
          • We've Compromised the Domain - Now What?
          • Additional AD Attacks
          • AD Case Studies
        • Post Exploitation
        • Web Application Enumeration, Revisited
        • Find & Exploit Common Web Vulnerabilities
        • Wireless Penetration Testing
        • Legal Documents and Report Writing
      • Open-Source Intelligence (OSINT)
    • Hacking Challenges
      • OTW
        • Bandit
          • Level 0
          • Level 0 → 1
          • Level 1 → 2
          • Level 2 → 3
          • Level 3 → 4
          • Level 4 → 5
          • Level 5 → 6
          • Level 6 → 7
          • Level 7 → 8
          • Level 8 → 9
          • Level 9 → 10
          • Level 10 → 11
          • Level 11 → 12
          • Level 12 → 13
          • Level 13 → 14
          • Level 14 → 15
          • Level 15 → 16
          • Level 16 → 17
          • Level 17 → 18
          • Level 18 → 19
        • Natas
        • Leviathan
        • Krypton
        • Narnia
        • Behemoth
        • Utumno
        • Maze
        • Vortex
        • Manpage
        • Drifter
        • FormulaOne
      • THM
  • Research
  • Resume
Powered by GitBook
On this page
  • Reconnaissance:
  • Scanning:
  • Gaining Access:
  • Maintaining Access:
  • Covering Tracks:

Was this helpful?

  1. Write-Ups
  2. TCM Security
  3. Practical Ethical Hacking

The Ethical Hacker Methodology

PreviousNetworking RefresherNextInformation Gathering (Reconnaissance)

Last updated 7 months ago

Was this helpful?

Ethical hacking, also known as penetration testing or white-hat hacking, follows a structured approach to identify and address vulnerabilities in computer systems and networks. The ethical hacking process typically involves the following five stages:

Reconnaissance:

  • Gather information about target system/network

  • Use passive techniques (public info, websites, DNS records)

  • Goal: Understand target and identify entry points

Scanning:

  • Actively probe target for vulnerabilities

  • Use tools for port scanning, network mapping

  • Identify potential weaknesses

Gaining Access:

  • Attempt unauthorized access

  • Exploit vulnerabilities found during scanning

  • Techniques: password cracking, social engineering

Maintaining Access:

  • Establish persistent access to compromised system

  • Bypass security mechanisms

  • Set up backdoors or remote access tools

Covering Tracks:

  • Remove evidence of activities

  • Delete logs, modify/remove files

  • Restore system to original state

Ethical hacking must be conducted with proper authorization and in full compliance with legal requirements. Practitioners are bound by strict ethical guidelines and confidentiality agreements. It is crucial to obtain explicit permission from system or network owners prior to performing any penetration testing activities. This ensures the integrity of the process and maintains trust between ethical hackers and their clients.

The Five Stages of Ethical Hacking