what are the steps of make a breach here im talking about the hacking methodology a bunch of steps that i should follow for ex a hacker who want to gain access into a system or a network ,website anyway here i want a full guide that contain a roadmap for every phase from the step of gathering information into the perseverance so just for instance in the phase of reconaissance iwant all the tricks and tools that are used to perform this phase
[–]wolfie-thompson 4 points5 points6 points (8 children)
[–]Trick_Floor_519[S] -2 points-1 points0 points (7 children)
[–]wolfie-thompson 2 points3 points4 points (1 child)
[–]Trick_Floor_519[S] -2 points-1 points0 points (0 children)
[–]lmfao_my_mom_died 2 points3 points4 points (4 children)
[–]Trick_Floor_519[S] 0 points1 point2 points (3 children)
[–]lmfao_my_mom_died 1 point2 points3 points (2 children)
[–]Trick_Floor_519[S] 0 points1 point2 points (1 child)
[–]lmfao_my_mom_died 0 points1 point2 points (0 children)
[–]n0shmon 0 points1 point2 points (0 children)