Information gathering
Hackers often use a range of information-gathering techniques to collect information about a target. This is an important step of hacking, as information gathering provides insight into the target. Typically, there are five phases of attack. These phases are as follows:
- Information gathering
- Scanning and enumeration
- Gaining access
- Maintaining access
- Covering tracks
Of the five phases, information gathering is the most important phase, where the attacker spends a considerable amount of time gathering information about the target. If the attacker collects more information, then it’s easier to understand the attack surface. Information gathering is usually classified into four categories:
- Footprinting
- Scanning
- Enumeration
- Reconnaissance
The information that the attacker could collect includes user information, IP addresses, DNS information, subdomains, and company information, which consists of company...