Topics: Through our class module, Ethical Hacking, we learned the typical attack procedures, including Reconnaissance (Information Gathering), Scanning, Gaining Access, Maintaining Access, and Hiding Tracks. For each procedure, we also learned the related techniques, tools, resources, and examples/demonstration. Once you review and understand the class materials, describe your hacking procedures according to the following guidelines. Hypothetically, your target organization is “acme.com,†which provides international online-banking services, for your discussion. The goal of this attack is to steal the customer information. As an ethical hacking, for each of the following procedures explain how you want to conduct the hacking procedure, using at least one tool (see the list of the tools for the procedure in the lecture materials and other resources available), in order to attack the target, “acme.com.†You should discuss the results you can get by using the tool and how they can help your attack. Please feel free to attach a snapshot of the tools you use.
o Reconnaissance (up to 150 words with at least one screenshot)
o Scanning (up to 150 words with at least one screenshot).
o Gaining Access (up to 150 words with at least one screenshot).
o Maintaining Access (up to 150 words with at least one screenshot).
o Hiding Tracks (up to 150 words with at least one screenshot).