Infecting a system with malware and using phishing to gain credentials to a system or web application are examples of which phase of the ethical hacking methodology?
A. Scanning
B. Gaining access
C. Maintaining access
D. Reconnaissance
A. Scanning
B. Gaining access
C. Maintaining access
D. Reconnaissance