Hacking is a dangerous process that hackers use to gain unauthorized access to any smartphone, television, computer, or other network system.
https://www.infosectrain.com/blog/domain-3-of-ceh-v11-system-hacking-phases-and-attack-techniques/
CEH v11
System Hacking Phases &
Attack Techniques
DOMAIN 3
www.infosectrain.com
www.infosectrain.com | sales@infosectrain.com
01
Domains of CEH
DOMAIN 1
Information Security &
Ethical Hacking Overview
DOMAIN 2
Reconnaissance
Techniques
DOMAIN 3
System hacking
phases
& Attack Techniques
DOMAIN 4
Network and perimeter
hacking
DOMAIN 5
Web application hacking
DOMAIN 6
Wireless network hacking
DOMAIN 7
Mobile platform, IoT,
& OT hacking
DOMAIN 8
Cloud Computing
DOMAIN 9
Cryptography
CEH v11
DOMAINS
6%
21%
17%
14%
16%
6%
8%
6%
6%
www.infosectrain.com | sales@infosectrain.com
02
The six hacking phases are:
> Reconnaissance
> Scanning and enumeration
> Gaining access
> Ascendancy of privileges
> Maintaining access
> Track coverage
DOMAIN 3
System Hacking Phases & Attack Techniques
In this blog, we will discuss the 3rd domain of CEH,
which is ‘System Hacking Phases & Attack
Techniques’
System Hacking Phases
01
www.infosectrain.com | sales@infosectrain.com
03
Reconnaissance
Reconnaissance is the first and pre-phase of hacking. Reconnaissance is the
process of gathering all the information about the target system, like active
ports, operating systems, and all the passive information.
For example, assume you want to surprise your childhood friend who lost touch
with you. The first thing you will do is gather all the information about them, like
their city, area, home address, etc. The process of collecting this information is
called reconnaissance.
DOMAIN 3
System Hacking Phases & Attack Techniques
www.infosectrain.com | sales@infosectrain.com
04
02
Scanning & Enumeration
This scanning and enumeration phase is where the attacker moves from
passive to active information gathering. The scanning is performed to gain
access to the target system, and the enumeration is performed to get detailed
information, including the user account data.
There are three types of scanning.
Port scanning: Port scanning is a phase where hackers scan the target
system for data like live systems, open ports, and diffe