Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
If a hacker follows the CEH methodology, what is the next step to be performed after footprinting?
Expanding Influence
Escalation of privileges
Scanning and enumeration
Covering tracks and placing backdoors
Once foot printing has been completed, scanning of the targeted system should follow. Scanning (and enumeration) is considered the second phase in methodology. Scanning should take place on two distinct levels, which are the network and host.
The following depicts all six phases of the methodology:
Performing reconnaissance and foot printing
Scanning and enumeration
Gaining access
Escalation of privilege
Maintaining access
Covering tracks and placing backdoors
(This is not true anymore. According to CEHv9 there are only five phases: Reconnaissance, Scanning and enumeration, Gaining access, Maintaining access and Covering tracks). EDIT ** WHAT DOES CISSP HAVE TO DO WITH CEHv9 Answer to edit - This question is inappropriately showing up for CISSP study too.
Train with Skillset and pass your certification exam. Faster. Guaranteed.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.