Gaining Access:- After scanning, the hacker designs the blueprint of the network of the target with the help of data collected during Phase 1 and Phase 2. This is the phase where the real hacking takes place. Vulnerabilities discovered during the reconnaissance and scanning phase are now exploited to gain access.
The method of connection the hacker uses for an exploit can be a local area network (LAN, either wired or wireless), local access to a PC, the Internet, or offline. Examples include stack based buffer overflows, denial of service (DoS), and session hijacking. These topics will be discussed in later chapters. Gaining access is known in the hacker world as owning the system.
A huge range of tools are available to offensivly test and gain access to networks and systems these can be found at Kali.org
- Backdoor Factory
- Linux Exploit Suggester
- Maltego Teeth
- Metasploit Framework
Designed as tools to access a host of computers, servers and networks these tools are the basis of main stream hacking. Have a look at some of the tools and see how they operate to help with your assessment on your network.