Infecting a system with malware and using phishing to gain credentials to a system or web application are examples of which phase of the ethical hacking methodology?
Both actions in the question aim to get into the target system or application:
Infecting a system with malware = delivering a payload to gain control.
Phishing to steal credentials = tricking users into giving access.
These are techniques used to exploit a vulnerability and enter the system, which is exactly what happens during the "Gaining Access" phase in the ethical hacking methodology.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
temp_acc
1 month, 1 week ago