Following this methodology, you'll begin the process of investigating a system with the intention of attacking and compromising the target. You'll start with the step known as footprinting, and subsequent steps depends on the result of the previous one.
The ethical hacking methodology follow these phases
This was written from CEHv8 material but the process applies to the process and concepts for most any CEH version.
The ethical hacking methodology follow these phases
- Phase 1: Footprinting
- Phase 2: Scanning
- Phase 3: Enumeration
- Phase 4: System Hacking
This was written from CEHv8 material but the process applies to the process and concepts for most any CEH version.