be collected in three parts, including network, host, and people involved.
The data collection can be done into methods called footprinting. It can
be active footprinting which consists of collecting information through
interacting with the target. Passive footprinting consists of gathering
information on the goal without interacting with the goal.
2)
Scanning - This involves data collection of relevant information that
one can use to gain access. In the scanning process, one will also
evaluate which of the weaknesses found will be used to ensure that the
hacker has been able to gain access to the system. Scanning should be
conducted according to the various types of scans. One should first
conduct a scan of the network and ports to understand the program or
the system better. Use the ideas gained to know where there can be
possible vulnerabilities. It is essential that scanning is conducted
systematically that will ensure that the hacker does not forget to scan for
anything. In the current phase, there are three types of scanning,
including port scanning, vulnerability scanning, and network mapping.
❖
Port scanning- in this scanning, the hacker will look for services
that run on the target, open ports, and live systems.
❖
Vulnerability scanning- Look for weaknesses in the target that
one can use to gain access to the system. Once the defects have
been identified, they can be exploited later.
❖
Network mapping- Involves mapping out and getting an idea of
how the target is arranged. For example, what network is being
used, routers, and firewalls that protect the system. This
information is essential in the hacking process and organizing the
hack.
3)
Gaining Access - the hacker will attempt to break into the system.
This can be through the use of various tools. The hacker will also need
to increase their privilege so that they can accomplish their task.
4)