8.2 – Hacking Process

8.2 – Hacking Process
The process of ethical hacking can be divided into five distinct phases. An ethical hacker follows procedures similar to those of a malicious attacker. The phase to gain, and maintain access to a computer system, is alike no matter what the hacker’s aims are. Below are the five phases which are generally followed by a hacker in a computer system. Information Gathering Information gathering is perhaps the longest phase, sometimes lasting weeks or months. The black hat utilizes a range of resources as much as possible to gain knowledge of target business and how it works, including: Social engineering Non-intrusive…
To access this content, you must subscribe to this Consolidated Tekedia Subscription, or log in if you are a member.

Share this post