Phases of Ethical Hacking

  • Reconnaissance (Information Gathering)
  • Scanning
  • Gaining Access
  • Maintaining Access
  • Covering Tracks

Phase 1: Reconnaissance (Information Gathering)

  • Passive Reconnaissance- In this phase, we gather as much information as possible about the target without the target’s knowledge.
    We collect all the information from public websites.
    For eg:
    * If we need the employees’ information of the target company we will search LinkedIn, Facebook
    * For Companies information we can go through LinkedIn Pages, Wikipedia, Crunch Base, Glassdoor, and main website of the target company.
    * We can collect the financial status of the companies via Economic times, stories of getting investment.
    * Getting much useful information of the company from Dumpster Diving (a process where you see the garbage bins near the company to see if there are important papers of the company or not)
  • Active Reconnaissance: In this phase, we are directly interacting with the target and the target system will know that we are getting some information about it. Active reconnaissance includes Banner Grabbing, DNS Zone File Transfer.

Phase 2: Scanning

Phase 3: Gaining Access

Phase 4: Maintaining Access

Phase 5: Covering Tracks

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store