In the pre-attack phase, there are seven steps, which have been defined by the EC-Council, as follows:
1. Information gathering
2. Determining network range
3. Identifying active machines
4. Finding open ports and applications
5. OS fingerprinting
6. Fingerprinting services
7. Mapping the network