1. List the five steps of the hacking process.
Answer: The five steps of the hacking process are: Reconnaissance, Scanning, Gaining Access, Maintaining Access and Covering Tracks.
2. To exploit or attack the targeted systems, what can you do as an initial first step to collect as much information as possible about the targets prior to devising an attack and penetration test plan?
Answer: To collect as much information as possible, we must follow the first phase of hacking, that is, the Reconnaissance. Sources like Internet searches, Social engineering, Dumpster diving, and Non-intrusive external or internal network scanning are ...