You are on page 1of 1

The Five Phases of Hacking

@Hackercombat
STAGE 1: RECONNAISSANCE
@Hackercombat Reconnaissance is the act of gathering
preliminary data or intelligence on your target.
The data is gathered in order to better plan for
STAGE 2: SCANNING your attack. It can be performed actively or
passively (meaning that your recon is being
This phase requires the application of
performed through an intermediary).
technical tools to gather further intelligence
on your target, but in this case, the intel being
sought is more commonly about the systems
that they have in place. A good example STAGE 3: GAINING ACCESS
would be the use of a vulnerability scanner on
a target network. This phase requires taking control of one or
more network devices to either extract data
from the target, or to use that device to then
STAGE 4: MAINTAINING ACCESS launch attacks on other targets.

This phase requires taking the steps involved @Hackercombat


@Hackercombat
in being able to be persistently within the
target environment in order to gather as much
data as possible. The attacker must remain STAGE 5: COVERING TRACKS
stealthy in this phase, so as to not get caught
while using the host environment. In this phase the attacker takes the steps
necessary to remove all semblance of
detection. Any changes that were made,
authorizations that were escalated etc. All must
return to a state of non-recognition by the host
network’s administrators.

You might also like