Watch this video on YouTube
Danny, a black hat hacker, has completed the phase of information gathering. He is now in the process of gaining credentials of the system by way of phishing? Danny is in which phase of hacking?