There are five stages of the hacking or steps that are followed essentially during ethical hacking. Different tools of kali Linux are used at different stages.
RECONNAISSANCE/INFORMATION GATHERING:
It is the first stage of hacking also called the information gathering. The stage of hacking in which hacker or penetration tester collect the information about the system or device or network of his target which is assigned to hacker to test and secure is called reconnaissance. In this stage of hacking a hacker collects information about routers, IP address, number of machines, email links of target with others, internet used by target. Penetration tester collects almost all necessary information he need using kali Linux tools like Nmap, Dmitry, Metasploit, Maltego, Massscan and much more.
SCANNING/VULNERABILITY ANALYSIS:
It is the second stage of hacking. The stage of hacking in which a hacker scans, system or network or web of his target and finds weakness or vulnerability in network or system, is called scanning. It is often performed with reconnaissance. It is the main target of penetration tester because he have to fix vulnerabilities to enhance security. Vulnerability analysis is performed by kali linux tools lika Wapiti, Nmap, Nikto, and may more.
GAINING ACCESS:
It is third stage of hacking in which hacker exploits the vulnerability of target system and gets control of system. Hacker can get control of email, whole system, internet, WiFi, Facebook anything he wants depend upon the vulnerability sensitivity. But mostly hacker get control of whole system. Black hat hacker uses vulnerability for unethical purposes to breach or steal data and blackmailing. But white hat hackers reports the vulnerability to the owner and fix it top enhance the security of target. Always become a white hat hacker.
MAINTAINING ACCESS:
It is the fourth stage of hacking in which hacker installs specific software on target machine/system to maintain the control on system. A white hat hacker try to maintain access to check the sensitivity of vulnerability (how much it will be dangerous) but black hat hacker maintains access for unethical purposes. Don’t become black hat hacker.
CLEARING TRACES:
It is the fifth and last stage of hacking followed by black hat hacker only in which hacker clears all proof from target system and no proof of hacking is left on target system because it is harmful for black hat hacker and it is always cause of arresting for him. But here question arises that what is meant by traces or logs? When some tasks are performed on a system then history and detail of these tasks is saved in log file of operating system and cache memory and these records are called traces. Hacker also performs task on target system and record is saved. When team of Digital Forensics analyzes the system then hacker can be tracked and arrested due to these records or traces. Black hat hacker clears the traces to prevent themselves. But he could not save themselves because it is hard to clear all traces fully and mostly black hat hackers are caught when they perform hacking. Hence, proved that, we must Avoid Black Hat Hacking and follow Ethical Hacking.
GUIDE FOR ADVANCE ETHICAL HACKERS
In this post we will discuss some major tips and tricks as well as guide lines for advance ethical hackers to make their career strong in the world of ethical hacking.
Don’t become a Black Hat Hacker because it can send you to red room.
Always try to be ethical or the white hat hacker because it will make your life easy and luxurious and your knowledge will improve the security of systems.
Follow the laws of Cyber Security and Ethical Hacking.
You must pay heed to hacking to make your knowledge strong in ethical hacking world.
You must be a high master of typing to write and execute the commands fast.
You must be a master in computer networking to understand security and sensitive places in networks. Security is often followed in networks.
You must be a best programmer in different languages like python, java, javascript, c, c++ etc.
You must learn short solutions of the problems to solve the problems sharply.
You must have high knowledge about VPN connections to save and hide yourself.
You must have ability to find and solve problem of any software because it is part of security.
You must have ability to access dark web and deep web to increase your knowledge.
You must have knowledge complete knowledge about the important software of the kali Linux like nmap, social engineering toolkit, burp suite, Metasploit, Maltego, john the ripper, nikto etc. and take online help also on websites, YouTube and other books.
You must be able to hack anything which someone requires but in ethical way.
You must trust your hacking skill and you must not take any pressure during hacking.
First you must learn and then try upon himself to check your ability.
You must work for the humanity not for money because it will make your life easy.
Now if we see the list of software of the kali Linux, it has so many tools or software and their number is increasing day by day. But there is a question that which software we must learn? I will discuss all important tools of the kali Linux and tell you that which is important and you must learn it. But it is your choice as you will learn more you will succeed.