ETHICAL HACKING
Tuesday, 12 July 2011
WHAT IS THE LIFE CYCLE OF HACKING?
1.) RECONNAISSANCE
2.) SCANNING
3.) GAINING ACCESS
4.) MAINTAINING ACCESS
5.) CLEANING TRACKS
No comments:
Post a Comment
Newer Post
Older Post
Home
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment