ceh certification training

5 Phases of Hacking

This article explains 5 steps of Hacking phases taking an example of a Hacker trying to hack … for example Reconnaissance, Scanning, Gaining Access, Maintaining Access, Fearing Tracks… In general, there are five Hacking phases: – Reconnaissance – Scanning – Gaining Access – Maintaining Access – Fearing Tracks Hacking Phase: Reconnaissance Reconnaissance refers to the preparatory phase in which an attacker gathers as much information as possible about the target prior to launching the attack. …

5 Phases of Hacking Read More »

Ethical-hacking

What is Ethical Hacking? & Types of Hacking

Ethical hacking is the practice of employing computer and network skills in order to assist organizations in testing their network security Ethical hacking for possible loopholes and vulnerabilities. White Hats are the individuals or experts who perform ethical hacking. Nowadays, most organizations are hiring White Hats to assist them in enhancing their cyber security. They perform hacking in ethical ways, with the permission of the network/system owner and without the intention to cause harm. Ethical …

What is Ethical Hacking? & Types of Hacking Read More »