In which phase of the ethical hacking process can Google hacking be employed? This is a technique that
involves manipulating a search string with specific operators to search for vulnerabilities.
Example:
allintitle: root passwd
A.
Maintaining Access
B.
Gaining Access
C.
Reconnaissance
D.
Scanning and Enumeration
C