Common Phases of an Attack
¨
Phase 1:
Reconnaissance
¨
Phase 2:
Scanning
¨
Phase 3: Gaining Access
¨
Phase 4: Maintaining Access
¨
Phase 5: Covering Tracks