Ethical Hacking: Enumeration
This phase Enumeration is done after scanning. As in scanning the hacker collects information about the active targets, ports, services etc. It is this phase where the hacker will make active connections to the target system and then try collecting more details information using queries etc.
Akash | 05-Dec-2016 | 1 Comments |