During which phase of a hacker's five-step approach does the hacker scan a network to identify IP hosts, open ports, and services enabled on servers and workstations?

Answered on

The phase of a hacker's five-step approach during which the hacker scans a network to identify IP hosts, open ports, and services enabled on servers and workstations is known as the "Scanning" phase.

The five-step approach typically consists of the following phases:

1. Reconnaissance:

  • Gathering information about the target system or network.

2. Scanning:

  • Identifying live hosts, open ports, and services on the network. This phase involves actively probing the target to gather more detailed information.

3. Gaining Access:

  • Exploiting vulnerabilities discovered during the scanning phase to gain unauthorized access to the target system or network.

4. Maintaining Access:

  • Establishing backdoors or maintaining a persistent presence within the compromised system to ensure continued access.

5. Analysis and Covering Tracks:

  • Analyzing the compromised system, covering tracks to avoid detection, and preparing for future attacks.


Related Questions