What are the five steps of ethical hacking

0 votes
Can somebody brief about the 5 steps of ethical hacking?
Jan 31, 2020 in Cyber Security & Ethical Hacking by anonymous
• 6,260 points
6,874 views

1 answer to this question.

0 votes

The 5 major steps involved in ethical hacking are:

Step 1: Reconnaissance - This is the first step of hacking which is also called the data gathering step. In this stage the attacker gathers information about the target. It is of two types. 

  • Active Reconnaissance - involves direct communication with the target to get the information.

  • Passive Reconnaissance - indirect methods of collecting the information of the target (social media, online sites etc)

Step 2: Scanning - one of the important before attack phases where the hacker explores the weak points of the application or systems. Hacker scans the collected data and deploys the appropriate tool to hack the aimed system.

Step 3: Gaining Access - The actual hacking takes place at this phase where hack gets successful in gaining access to the target system, network, or application using the potential tools and techniques.

Step 4: Maintaining Access - As soon as the hacker gets access, they wish to keep that access for future attacks without letting the user know about it. There are various malicious files available online to do this job. Once the hacker maintains the access, he or she can use it as a base for undertaking other future attacks.

Step 5: Covering Tracks -  This is the last phase of hacking where the attacker tries to cover all the tracks so that he doesn't get caught by the security personnel or not get into any legal trap.

Hope this helps!

To know more, join our CEH Course Online today.

answered Jan 31, 2020 by Sirajul
• 59,230 points

edited Oct 6, 2021 by Sarfaraz

Related Questions In Cyber Security & Ethical Hacking

0 votes
0 answers

What are the elements of Cyber Security

Dec 8, 2021 in Cyber Security & Ethical Hacking by Error
• 420 points
432 views
0 votes
0 answers

what are the elements of cyber security

what are the elements of cyber security READ MORE

Dec 10, 2021 in Cyber Security & Ethical Hacking by Kavya
• 700 points
531 views
0 votes
1 answer
0 votes
1 answer

What are the comand used for troubleshooting DHCP issues?

The most common command used to troubleshoot ...READ MORE

answered Mar 23, 2019 in Cyber Security & Ethical Hacking by Priyaj
• 58,020 points
1,102 views
0 votes
1 answer

What is enumeration in ethical hacking?

Enumeration is a part of the first ...READ MORE

answered Feb 3, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,230 points

edited Oct 6, 2021 by Sarfaraz 5,499 views
0 votes
1 answer

what is footprinting in ethical hacking?

Footprinting is a part of the Reconnaissance phase of ...READ MORE

answered Feb 3, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,230 points

edited Oct 6, 2021 by Sarfaraz 1,052 views
0 votes
1 answer

How python is used in ethical hacking?

It is common practice amongst ethical hackers ...READ MORE

answered Feb 3, 2020 in Cyber Security & Ethical Hacking by anonymous
• 59,230 points

edited Oct 7, 2021 by Sarfaraz 1,115 views
+1 vote
1 answer

How to get into cyber security domain?

The number of cyber-crimes is on an ...READ MORE

answered Jan 29, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,230 points

edited Oct 7, 2021 by Sarfaraz 824 views
0 votes
1 answer

What is ethical hacking?

Hacking is referred to as the illegal ...READ MORE

answered Jan 31, 2020 in Cyber Security & Ethical Hacking by Sirajul
• 59,230 points

edited Oct 7, 2021 by Sarfaraz 881 views
webinar REGISTER FOR FREE WEBINAR X
REGISTER NOW
webinar_success Thank you for registering Join Edureka Meetup community for 100+ Free Webinars each month JOIN MEETUP GROUP