Phases of Ethical hacking

Currently reading:
 Phases of Ethical hacking

Bigel

Member
LV
1
Joined
Aug 15, 2023
Threads
20
Likes
4
Awards
5
Credits
1,357©
Cash
0$

Phases of Ethical Hacking:

Name of TermDescription of term
ReconnaissanceThis is the first stage in which hackers try to gather information about their targets.
Scanning & Enumeration During this stage, data is scanned using tools such as dialers, port scanners, network mappers, sweepers, and vulnerability scanners.
Gaining Access In this phase, using the data collected in Phases 1 and 2, hackers design a blueprint for the target’s network.
Maintaining Access Once hackers gain access, they want to retain that access for future exploits and attacks. Once hackers own a system, they can use it as a base to launch further attacks.
Covering Tracks Before attacking, the attacker changes its MAC address and runs the attacking computer through at least one VPN to disguise its identity.
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Tips

Similar threads

Top Bottom