The Ethical Hacker Methodology
Reconissance Info Gathering. Active Scanning and Enumeration Using Different Tools Finding Open Ports and Vulneribilities Passive Google Search Social Media Scan Facebook Twitter Linkedin, etc. Scanning & Enumeration Scanning Through PC Nmap Nessus Nikto, etc.7 Gaining Access Exploitation Maintaining Access Also Scanning And Enumeration Covering Tracks Deleting Logs and Cleaning Up The Method is also called 5 Stages of Ethical Hacking.