As mentioned earlier ethical hacker takes same steps as malicious hacker. Following are different steps that are performed during hacking.
This step involves gathering potential information about target system. In fact hacker spends 90% of time for this phase only and next 10% time for rest of the steps.
During this phase network is scanned for vulnerability.
This is the step where real hacking takes place. Hacker takes advantage of vulnerability found in scanning phase and penetrates the victim system.
After gaining access hacker makes provision to come back by planting root-kit and backdoor.
In this phase hacker removes all traces of his/her presence in system by removing log files and event logs.