In this post, we are going to learn the 5 phases of hacking which is used when hacking into systems. These are the phases which a typical hacker goes through in order to successfully compromise a system. 1. Reconnaissance So the first phase of hacking is reconnaissance. Also known as Information Gathering. It is done […]
Categories
The 5 Phases of Hacking
- Post author By Stephen Ajulu
- Post date March 19, 2020
- 1 Comment on The 5 Phases of Hacking
- Tags 5 phases of hacking, 5 steps of hacking, active reconnaissance, armitage, backdoor, birdwatcher, black hat, black hat hacker, black hat hackers, clearing tracks, covering tracks, dns records, dumpster diving, enumeration, ethical hacking, ethical hacking enthusiasts, exploit, exploitation, gaining access, Grey hat, grey hat hacker, Grey hat hackers, hacker, hackers, Hacking, hacking prevention, hacking techniques, hacking with android, how to successfully exploit a system, how to successfully penetrate a system, information gathering, IP address, ip ranges, maintaining access, metasploit, metasploit framework, nikto, nmap, passive information gathering, passive reconnaisssance, password policy, penetration tester, ping, recon, reconnaissance, reconnaissance and information gathering, rootkit, rootkits, scanning, scanning and enumeration, setoolkit, shellter, sniffing, social engineering, social engineering toolkit, stephen, stephen ajulu, stephen alusa, stephen odero, stephen odero ajulu, stephen otieno, steve, subdomains, system logs, thc hydra, the 5 phases of hacking, theharvester, trojan, trojan horse, trojans, valuable assets, vulnerabilities, vulnerability, vulnerability scanning, webshell, webshells, white hat, white hat hacker, white hat hackers, white hat vs grey hat vs black hat vs script kiddie vs green hat vs red hat vs blue hat vs hacktivist, whois, wireshark, wpscan