legal contact
 

Phase 2

·Phase 2: Enumaration: Find out how and where to use the information found in previous step to discover attack vectors

During the enumeration phase, a lot of information about specific systems is collected to find vulnerable and exploitable systems and define alternate attack vectors (i.e. spear phishing, etc.)

Find and scan live hosts and access point

Find accounts and policies

Vulnerability assessment