Phases of Ethical Hacking:
| Name of Term | Description of term |
|---|---|
| Reconnaissance | This is the first stage in which hackers try to gather information about their targets. |
| Scanning & Enumeration | During this stage, data is scanned using tools such as dialers, port scanners, network mappers, sweepers, and vulnerability scanners. |
| Gaining Access | In this phase, using the data collected in Phases 1 and 2, hackers design a blueprint for the target’s network. |
| Maintaining Access | Once hackers gain access, they want to retain that access for future exploits and attacks. Once hackers own a system, they can use it as a base to launch further attacks. |
| Covering Tracks | Before attacking, the attacker changes its MAC address and runs the attacking computer through at least one VPN to disguise its identity. |