Hello friends !
                      Toa kese hain aap log 😅
So friends , today i am going to show you the hacking steps to hack the system.
So , without wasting anymore time let us move on our topic .

1. RECONNAISSANCE  :- Why this is the first step ? Let me tell you , suppose if you are given anywork about you don't know anything . So what you will do first . You will research on that work , you will gain information about that work. 
Exactly like that Reconnaissance means to gather information about the system and about the victim. 
You will gain information about victim by social engineering or it is depended on you how you do it .

2. SCANNING  :- As you saw the above example that the first step we gather information of the target as much as possible. But sometime maybe there all information provided by the user or the target is not 💯% wright . So , for that we have to scan all the information and extract the wright ( Usefull ) information .

In this step what you have to do is ! You have to scan the system of victim means you have to find vulnerability of the victims system, and ip address , domain name , OS information ,scanning which ports are opened on victims system and so on !

3. EXPLOITATION. :- This step means to exploit the system means gaining access to the system by using different types of exploit or tools .Hacker hack (access) the system and gets the information whatever he wants to get.

4.CLEARING FOOTPRINTS LOGS :- 
So this is the final step in Which hacker removes all the records history etc.
Simply guys if hacker didn't do this then he/sh can easily tracked by cybersecurity expert team.


                              <<<❤❤❤>>>
👉🏻All the information provided in this blog is for an educational purpose. Do not missuse of this information.. I will not responsible for any kind of your missuse. 

👉🏻 Want to know basic commands of linux? 
                              <<<❤❤❤>>>

             < RECOMMENDED FOR YOU >

👉🏻 Linux rarely known commands by the user . 
                 Click here and knew it
👉🏻 How to hack social media accounts..                    Methods to hack.. 
                 Click here and knew it
👉🏻How to install metasploit in termux 
                 Click here and knew it

                   🙏🏻Stay home stay safe 🙏🏻

                        127.0.0.1 to 0.0.7.7