Answer Posted / sandy
Reconnaissance(Information gathering) Phase
Scanning phase
Gaining Access phase
Maintaining Access Phase
Covering Tracks phase
| Is This Answer Correct ? | 2 Yes | 0 No |
Post New Answer View All Answers
What laptops hackers use?
Who is the best hacker in the world?
Who is the most dangerous hacker?
What tools do real hackers use?
What laptops do hackers use?
Explain what is DOS (Denial of service) attack? What are the common forms of DOS attack?
What software do hackers use?
What is footprinting in ethical hacking? What is the techniques used for footprinting?
What are the 3 types of hackers?
How do hackers hack passwords?
What os do hackers use?