header bg

Scan QR code or get instant email to install app


To converge more in-depth information on the targets, which stage of an ethical hack would the attacker actively apply tools and techniques?

A Scanning and enumeration.

Scanning and enumeration, the second of five phases of an ethical hack attempt, is the stage in which ethical hackers take the information collected in recon and actively employ tools and techniques to obtain additional in-depth information on the targets.

Related Information