1. Scanning Open Ports , Misconfig in Web App etc etc
2. Checking Vulnerabilities via Vulnerabilities Scanner
3 . Gaining Access Exploiting Vulnerabilities
4. Maintaining Access via FUD Malware
5 . Clearning Tracks / Logs to be Anonymous.
The most Important thing is to Be Anonymous in all these Activities which itself is a crime according to Cyber Laws.
How to be Anonymous :
Pre Activitity before trying all of them is to change mac address / Identity of Network Interface Card first then apply any VPN or Proxy with socks5 .
2. Checking Vulnerabilities via Vulnerabilities Scanner
3 . Gaining Access Exploiting Vulnerabilities
4. Maintaining Access via FUD Malware
5 . Clearning Tracks / Logs to be Anonymous.
The most Important thing is to Be Anonymous in all these Activities which itself is a crime according to Cyber Laws.
How to be Anonymous :
Pre Activitity before trying all of them is to change mac address / Identity of Network Interface Card first then apply any VPN or Proxy with socks5 .