While the phases discussed in the webinar are from the perspective of a hacker, King explains that these are the same phases used by a white hat hacker to test an organization’s network. To put it simply, an attacker uses this approach to breach the network, while the ethical hacker uses it to protect it.
This is the primary phase where the Hacker tries to collect as much information as possible about the target .
Hacker may employ during the scanning phase can include dialers, port scanners, network mappers, sweepers, and vulnerability scanners .
The method of connection the hacker uses for an exploit can be a local area network (LAN, either wired or wireless), local access to a PC, the Internet, or offline .
Once a hacker has gained access, they want to keep that access for future exploitation and attacks.
Once hackers have been able to gain and maintain access, they cover their tracks to avoid detection by security personnel, to continue to use the owned system, to remove evidence of hacking, or to avoid legal action.