legal contact
 

Phase 1

· Phase 1: Information gathering before the actual attack starts

This includes technical as non-technical information gathering about the target.

Try to find people of the target writing something about there network/company in the internet.

Information gathering

Physical and social engineering

locate network range(s)