The 5 Phases of Hacking

In this post, we are going to learn the 5 phases of hacking which is used when hacking into systems. These are the phases which a typical hacker goes through in order to successfully compromise a system. 1. Reconnaissance So the first phase of hacking is reconnaissance. Also known as Information Gathering. It is done … Continue reading The 5 Phases of Hacking

Detect Rootkits In Kali Linux

What is a Rootkit? A rootkit is a clandestine computer program designed to provide continued privileged access to a computer while actively hiding its presence. Rootkits are generally associated with malware – such as Trojans, worms, viruses – that conceal their existence and actions from users and other system processes. You can see in this scene … Continue reading Detect Rootkits In Kali Linux