Hacking Phase 2 - Scanning

Phase 2 - Scanning

*

Scanning refers to pre-attack phase when the hacker scans the network with specific information gathered during reconnaissance.
*

Business Risk - 'High' - Hackers have to get a single point of entry to launch an attack and could be point of exploit when vulnerability of the system is detected.
*

Scanning can include use of dialers, port scanners, network mapping, sweeping, vulnerability scanners etc.

Comments