4.1 – Phases of Ethical Hacking

4.1 – Phases of Ethical Hacking
Hackers are often smart users with good computer knowledge, and capable of creating and exploring computer hardware and software. Their purpose can be either to dig into illegal activities or to gain knowledge. Ethical hackers are driven by the eagerness to know more while malicious hackers aim to steal the data. In general, there are five phases of Ethical Hacking: Information Gathering Scanning Gaining Access Maintaining Access Covering Tracks Information Gathering: Information gathering refers to reconnaissance which literally means an initial survey to collect the information. This phase is also known as foot printing. It is the first phase of ethical hacking…
To access this content, you must subscribe to this Consolidated Tekedia Subscription, or log in if you are a member.

Share this post