The five different phases of ethical hacking are observation, scanning, gaining access, maintaining access, and covering tracks. Hackers obtain information during observation; during scanning, they look for weaknesses. Exploiting flaws is necessary to gain access, and doing so also maintains control. Finally, removing the evidence of the intrusion is part of concealing tracks, providing ethics throughout the procedure.