During which phase of a hacker's five-step approach does the hacker scan a network to identify IP hosts, open ports, and services enabled on servers and workstations?
Computers and Technology · High School · Sun Jan 24 2021
Answered on
The phase of a hacker's five-step approach during which the hacker scans a network to identify IP hosts, open ports, and services enabled on servers and workstations is known as the "Scanning" phase.
The five-step approach typically consists of the following phases:
1. Reconnaissance:
- Gathering information about the target system or network.
2. Scanning:
- Identifying live hosts, open ports, and services on the network. This phase involves actively probing the target to gather more detailed information.
3. Gaining Access:
- Exploiting vulnerabilities discovered during the scanning phase to gain unauthorized access to the target system or network.
4. Maintaining Access:
- Establishing backdoors or maintaining a persistent presence within the compromised system to ensure continued access.
5. Analysis and Covering Tracks:
- Analyzing the compromised system, covering tracks to avoid detection, and preparing for future attacks.