Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

In this assignment, you need to pretend to be ethical hackers who need to protec

ID: 3860791 • Letter: I

Question

In this assignment, you need to pretend to be ethical hackers who need to protect their organization from a computer attack. List the general phases of a computer attack. Thinking like an attacker, you should add items to each phase that an attacker would consider when performing a successful computer attack.

List the general phases of a computer attack. Include items (tools, services, techniques) in each phase that an attacker would consider when performing a successful attack.

Phase 1

Phase 2

Phase 3

Phase 4

Phase 1

Phase 2

Phase 3

Phase 4

Explanation / Answer

Inorder to perform an computer attack every ethical hacker must follow the below five phases.

the phases are

1. Reconnaissance:

in this phase we use different tools to gather information about target organization they are:

whois - to find out the domain realted information

the best tool to gather much information about target organization is

http://dnsstuff.com - which povides most of the tools that are useful in this phase.

2. Scanning:

3. Gaining Access:

4. Maintaining Access:

5. Covering Tracks: