Notes

Phases of Ethical Hacking

Back to cyber security page


Steps 1 : Reconnaissance

Gathering information about potential target

Steps 2 : Scanning

Examine network and use info gained in reconnaissance step

Steps 3 : Gaining Access

Gain access of system by attacking

Steps 4 : Maintaining Access

Keeping access for further hacking / penetration

Steps 5 : Coverting track

Covering tracks and deleting logs


Source: