Phases of Hacking
Hacking involves a systematic process comprising five distinct phases. While not strictly adhering to a sequential order, these steps contribute to a comprehensive and effective approach when followed in a stepwise manner. Phases of Hacking: 1. Reconnaissance: - Also known as Footprinting, this initial phase involves gathering preparatory information about the target. Information is collected regarding the network, host, and individuals involved. Two methods of Footprinting include active (directly interacting with the target, e.g., using Nmap) and passive (collecting information without direct access, e.g., from social media). 2. Scanning: - This phase encompasses three types of scanning: - Port scanning: Identifying open ports, live systems, and services on the host. - Vulnerability scanning: Checking for exploitable weaknesses using automated tools. - Network mapping: Determining the netwo...