Hello guest, if you read this it means you are not registered. Click here to register in a few simple steps, you will enjoy all features of our Forum.
Rules have been updated! Here

Tags
Author: MaskedUser - Replies: 10 - Views: 10124
Basic Steps of Hacker or Ethical Hacker
1. Scanning Open Ports , Misconfig in Web App etc etc

2. Checking Vulnerabilities via Vulnerabilities Scanner

3 . Gaining Access Exploiting Vulnerabilities

4. Maintaining Access via FUD Malware

5 . Clearning Tracks / Logs to be Anonymous.

The most Important thing is to Be Anonymous in all these Activities which itself is a crime according to Cyber Laws.
How to be Anonymous :

Pre Activitity before trying all of them is to change mac address / Identity of Network Interface Card