Which of the following is the most important phase of ethical hacking wherein you need to spend considerable amount of time?
Gaining access
Escalating privileges
Network mapping
Footprinting
Submit