Question: Identify the term among the following which is the first phase of ethical hacking?
A DNS poisoning
B Footprinting
C ARP-poisoning
D Enumeration
Answer: Footprinting
Different Phases of ethical hacking | Description |
Footprinting | Gathering information about the target network, such as IP addresses, domain names and publicly available information. |
Scanning | Identifying open ports, services and potential vulnerabilities on the target system through techniques like port scanning and vulnerability scanning. |
Enumeration | Collecting detailed information about the target system, such as user accounts, shares and more, to understand its structure and potential weaknesses. |
Vulnerability analysis | Identifying and analyzing vulnerabilities within the system or network, including software flaws and misconfigurations. |
Exploitation | Actively exploiting the identified vulnerabilities to gain access or control over the target system, simulating a cyberattack. |
Post-exploitation | Maintaining access to the compromised system, covering tracks, and pivoting to gather more information or extend the attack. |
Reporting | Documenting findings, vulnerabilities and recommendations in a detailed report for the system owner. |
Cleanup and remediation | Assisting the system owner in mitigating vulnerabilities and improving security to prevent future attacks. |