Announcement

Collapse
No announcement yet.

Ethical Hacking Methodology

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Ethical Hacking Methodology

    Following this methodology, you'll begin the process of investigating a system with the intention of attacking and compromising the target. You'll start with the step known as footprinting, and subsequent steps depends on the result of the previous one.

    The ethical hacking methodology follow these phases
    • Phase 1: Footprinting
    • Phase 2: Scanning
    • Phase 3: Enumeration
    • Phase 4: System Hacking

    This was written from CEHv8 material but the process applies to the process and concepts for most any CEH version.
    Certified Security Geek
Working...
X