You
r team has won a contract to infiltrate an organization. The company wants to have the attack be as realistic as possible; therefore, they did not provide any information besides the company name.
What should be the first step in security testing the clie
nt?
A. Reconnaissance
B. Enumeration
C. Scanning
D. Escalation
Phases of hacking
Phase 1-”Reconnaissance
Phase 2-”Scanning
Phase 3-”Gaining Access
Phase 4-”Maintaining Access
Phase 5-”Covering Tracks
Phase 1: Passive and Active Reconnaissance
Passive reconnaissance involves gathering information regarding a potential target without the targeted individual-s or company-s knowledge.
Active reconnaissance involves probing the network to discover individual hosts, IP addresses, and services on the
network.
References: