which phase of the ethical hacking process can Google h…

In which phase of the ethical hacking process can Google hacking be employed? This is a technique that
involves manipulating a search string with specific operators to search for vulnerabilities.
Example:
allintitle: root passwd

In which phase of the ethical hacking process can Google hacking be employed? This is a technique that
involves manipulating a search string with specific operators to search for vulnerabilities.
Example:
allintitle: root passwd

A.
Maintaining Access

B.
Gaining Access

C.
Reconnaissance

D.
Scanning and Enumeration



Leave a Reply 1

Your email address will not be published. Required fields are marked *