In this assignment, you need to pretend to be ethical hackers who need to protec
ID: 3860791 • Letter: I
Question
In this assignment, you need to pretend to be ethical hackers who need to protect their organization from a computer attack. List the general phases of a computer attack. Thinking like an attacker, you should add items to each phase that an attacker would consider when performing a successful computer attack.
List the general phases of a computer attack. Include items (tools, services, techniques) in each phase that an attacker would consider when performing a successful attack.
Phase 1
Phase 2
Phase 3
Phase 4
Phase 1
Phase 2
Phase 3
Phase 4
Explanation / Answer
Inorder to perform an computer attack every ethical hacker must follow the below five phases.
the phases are
1. Reconnaissance:
in this phase we use different tools to gather information about target organization they are:
whois - to find out the domain realted information
the best tool to gather much information about target organization is
http://dnsstuff.com - which povides most of the tools that are useful in this phase.
2. Scanning:
3. Gaining Access:
4. Maintaining Access:
5. Covering Tracks: