The 5 Phases of Ethical Hacking

preview_player
Показать описание
Hackers are generally intelligent individuals with good computer skills, with the ability to create and explore the computer’s software and hardware. Their intention can be either to gain knowledge or to dig around to do illegal things. Attackers are motivated by the zeal to know more while malicious attackers would intend to steal data. In general, there are five phases in which an intruder advances an attack:
Reconnaissance
Scanning
Gaining Access
Maintaining Access
Covering Tracks

Find me:

Disclaimer: Hacking without having permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against real hackers.
Рекомендации по теме