Ethical Hacking Phases — Cybersecurity Mind Map - The Cyber Security Network

Press ESC to close

Ethical Hacking Phases — Cybersecurity Mind Map

6. Ethical Hacking Phases

Ethical hacking follows a disciplined methodology to identify vulnerabilities before attackers do. This mind map covers each phase with tools and techniques used.

Topics Covered

  • Phase 1: Footprinting — OSINT, passive and active recon
  • Phase 2: Scanning — Nmap port scan, service enumeration
  • Phase 3: Gaining access — exploitation, password attacks
  • Phase 4: Maintaining access — persistence, backdoors
  • Phase 5: Clearing tracks — log deletion, artefact removal
  • Black/white/grey box testing approaches
  • Scope, rules of engagement, authorisation
  • Responsible disclosure and CVE reporting
Exit mobile version
Exit mobile version