Stages of Ethical Hacking Flashcards
Describe all the stages.
Reconnaissance: It involves gathering information about a target system or network, it can be active or passive. The main goal is to gather as much information as possible in order to better understand your target and to find potential entry points.
Scanning: The ethical hacker actively probes the target system or network to find open ports and services. The goal is to find potential weaknesses that can be exploited.
Gaining Access: Using the vulnerabilities found in the scanning stage, the ethical hacker will try to gain unauthorized access to the target system or network.
Maintaining Access: Using techniques such as setting up backdoors or remote access tools, the ethical hacker will try to maintain his access to the compromised system or network.
Covering Tracks: Clean up. Delete logs, created files or users. Restore the system to its original state.