Ethical Hacking Phases — Cybersecurity Mind Map
6. Ethical Hacking Phases
Ethical hacking follows a disciplined methodology to identify vulnerabilities before attackers do. This mind map covers each phase with tools and techniques used.
Topics Covered
- Phase 1: Footprinting — OSINT, passive and active recon
- Phase 2: Scanning — Nmap port scan, service enumeration
- Phase 3: Gaining access — exploitation, password attacks
- Phase 4: Maintaining access — persistence, backdoors
- Phase 5: Clearing tracks — log deletion, artefact removal
- Black/white/grey box testing approaches
- Scope, rules of engagement, authorisation
- Responsible disclosure and CVE reporting
