Common Hacking Methodologies

A hacking methodology refers to the step-by-step approach an attacker uses to attack a target. There is no one single approach used by all hackers, however. A major difference between a malicious hacker and an ethical hacker is the code of ethics to which each subscribes.

Hacking methodology generally includes the following steps (FIGURE 1-3):

  1. Reconnaissance—An attacker passively acquires information about the intended victim and/or the intended victim’s systems. The purpose of reconnaissance is to identify one or more potential entry points into a target environment. This phase includes both passive information gathering, in which no active interaction occurs between the attacker and the victim (for example, conducting ...

Get Ethical Hacking: Techniques, Tools, and Countermeasures, 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.