The process of hacking any computer network or system includes :
Reconnaissance : The first step taken by a hacker is identifying the target and fetching information as much information they could.
Scanning : The next step is examining the victim by exploiting the information gathered during reconnaissance, using automated tools like port scanners, mappers, or vulnerability scanners.
Gaining access : This initiates the process of hacking, where the collected information helps to gain access to the computer network or system.
Maintaining access : The hacker now would like to access it repetitively, and thus need to secure it through backdoors, rootkits, and Trojans.
Covering tracks : To avoid detection and any legal action, hackers erase the tracks that may lead to investigators tracing them.