Pre-Attack Phase: Two Types of Information Gathering
All attacks are done in phases, sometimes the attacker is aware of this and sometimes they are not. Either way, every attack on any given system goes through the same set of phases. Let us have a closer look at those phases.
This lesson is only available to Linux Academy members.