Learn Hacking


Phases of hacking


The Five Phases of Ethical Hacking


While the phases discussed in the webinar are from the perspective of a hacker, King explains that these are the same phases used by a white hat hacker to test an organization’s network. To put it simply, an attacker uses this approach to breach the network, while the ethical hacker uses it to protect it.



1) Reconnaissance


This is the primary phase where the Hacker tries to collect as much information as possible about the target .


2) Scanning


Hacker may employ during the scanning phase can include dialers, port scanners, network mappers, sweepers, and vulnerability scanners .


3) Gaining Access


The method of connection the hacker uses for an exploit can be a local area network (LAN, either wired or wireless), local access to a PC, the Internet, or offline .


4) Maintaining Access


Once a hacker has gained access, they want to keep that access for future exploitation and attacks.


5) Covering Tracks


Once hackers have been able to gain and maintain access, they cover their tracks to avoid detection by security personnel, to continue to use the owned system, to remove evidence of hacking, or to avoid legal action.