What are the five stages of Ethical Hacking?
Reconnaissance Scanning Gaining Access Maintaining Access Covering Tracks
What is the purpose of Reconnaissance?
Narrow down specific targets and techniques.
What is passive reconnaissance?
Indistinguishable from normal public traffic.
Name three techniques associated with active reconnaissance.
Network Scan
Vulnerability Scan
Ping Sweep