Answer
Explanation:
Hacking is simply gaining access into a computer through weaknesses that were found in the network system.
We have mainly 5 stages In ethical hacking which although must not be followed sequentially but could produce greater results if it was followed.
These stages includes
1. Reconnaissance
2. Scanning
3. Gaining access
4. Maintaining access
5. Covering tracks.
I use host -a
dig and nslookup could do it, I forget the switches and arguments.
Yeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeesss i have
STAR PLATINUM ZA WARUDO... ORA ORA ORA ORA ORA ORA ORA ORA ORA