According to EC-Council
EC-Council identify in the CEH course 5 hacking phases:
- Reconnaissance
- Scanning
- Gaining Access
- Maintaining Access
- Clearing Tracks
According to ISACA
ISACA identify 8 phases in a cybersecurity generalized attack processs:
- Perform reconnaissance
- Create attack tools
- Deliver malicious capabilities
- Exploit and compromise
- Conduct an attack
- Achieve results
- Maintain a presence or set of capabilites
- Coordinate a campaign
External References
“CEH v10”, EC-Council
“CSX Cybersecurity Fundamentals Study Guide 2nd Edition”, ISACA, page 35