# The Hacker Methodology

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-McROuTK3A_nDuU_GJvE%2F-McRPvcupSXgpJaEIFH6%2Fimage.png?alt=media\&token=38f6c3cc-64ae-4727-83c5-eb1b8b5731b4)

## Methodology Outline

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-McRQy4rDZvELSAG0p0q%2F-McRR34SNKEaHWvLbt9F%2Fimage.png?alt=media\&token=bf0c0cd9-0d5e-4058-9acc-58eb7aa29cb7)

## Reconnaissance Overview

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-McRQy4rDZvELSAG0p0q%2F-McRRIUA1nV94Om1un6I%2Fimage.png?alt=media\&token=dc47ab60-57f9-445f-b4ce-189cfb85e1d3)

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-McRQy4rDZvELSAG0p0q%2F-McRRR9bVnalCCVt_YVe%2Fimage.png?alt=media\&token=1d1a177e-273a-486f-8e3d-b319d4283e47)

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-McRQy4rDZvELSAG0p0q%2F-McRRWPhNVbxgA5RnGbz%2Fimage.png?alt=media\&token=ab4132e0-bfd1-41b4-b581-869969064c30)

## Enumeration and Scanning Overview

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-McRQy4rDZvELSAG0p0q%2F-McRRoSSu3Ybm-VkMWp8%2Fimage.png?alt=media\&token=61335a94-d7cc-4e7a-b342-f7001cd50e9d)

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-McRQy4rDZvELSAG0p0q%2F-McRRu0hnQ8rtHG8Wv8J%2Fimage.png?alt=media\&token=c5f09044-6c00-4eeb-80af-c0fd65395ee3)

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-McRQy4rDZvELSAG0p0q%2F-McRRxx2RKkl0VTOv84R%2Fimage.png?alt=media\&token=d8e418c2-221c-4db1-a40f-04544b8b39e4)

## Exploitation

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-McRQy4rDZvELSAG0p0q%2F-McRS3HCPQTVUKfV3Si6%2Fimage.png?alt=media\&token=5a8e49f6-2913-45ab-a0b6-9f3da4f5fa7b)

## Privilege Escalation

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-McRQy4rDZvELSAG0p0q%2F-McRSEWlDbAGSecZ0aBP%2Fimage.png?alt=media\&token=9003c08d-7df2-45f9-8ff8-8ce4d38f91e4)

## Covering Tracks

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-McRQy4rDZvELSAG0p0q%2F-McRSKje5XCzqBTivAed%2Fimage.png?alt=media\&token=1b669606-c656-431d-b28b-68e70efb2d19)

## Reporting

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-McRQy4rDZvELSAG0p0q%2F-McRSqArC-rh7gervTCN%2Fimage.png?alt=media\&token=ba458625-f513-4116-a8be-cbdb016b166c)

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-McRQy4rDZvELSAG0p0q%2F-McRSt9bpmTGZhxl-dV6%2Fimage.png?alt=media\&token=71d976cf-4f64-40c1-ab0b-11635331ab38)

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-McRQy4rDZvELSAG0p0q%2F-McRSvqQXv8A1Ol0qdTS%2Fimage.png?alt=media\&token=486c205e-9471-4063-beb2-db113a023aa2)

![](https://1569822153-files.gitbook.io/~/files/v0/b/gitbook-legacy-files/o/assets%2F-Ma_-L-NUkJ1mxbddZG2%2F-McRQy4rDZvELSAG0p0q%2F-McRSzPaCVLixYnEGcu6%2Fimage.png?alt=media\&token=1406144f-3192-4d78-997c-229c14058ccd)
