What is reconnaissance in ethical hacking?
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
More articles
- Hak5 Tools
- Hacking Tools Hardware
- Pentest Tools Website Vulnerability
- Pentest Tools For Mac
- Pentest Tools Tcp Port Scanner
- Best Hacking Tools 2019
- Pentest Tools For Windows
- Hacker Tools Free
- Hack Tools For Ubuntu
- Hacking Tools Windows 10
- Pentest Tools Github
- Hack Tools Online
- Pentest Tools Find Subdomains
- Hacks And Tools
- Hacker Tools Mac
- Pentest Tools Tcp Port Scanner
- Hack Tools Download
- Hack Tools
- Pentest Automation Tools
- How To Make Hacking Tools
- Hacking Tools For Windows Free Download
- Hack Tools Download
- Pentest Tools Website
- Pentest Tools Framework
- Pentest Tools Apk
- Hack Rom Tools
- Hacking Tools Pc
- Hack Tools For Games
- World No 1 Hacker Software
- Hacks And Tools
- Hacking Tools Windows 10
- Pentest Tools For Ubuntu
- Hack Apps
- Hack Tools
- Hacking Tools Hardware
- Hacking Tools Github
- Hacking Tools Hardware
- Pentest Tools Subdomain
- Pentest Reporting Tools
- Hacking Tools 2020
- Hack Website Online Tool
- Hacker Tools Mac
- Pentest Tools Find Subdomains
- Pentest Tools Apk
- World No 1 Hacker Software
- Pentest Recon Tools
- Pentest Tools Linux
- Nsa Hacker Tools
- Pentest Tools For Windows
- Hack Tools Mac
- Hacking Tools Hardware
- Hack Tools For Pc
- Hacking Tools For Beginners
- Pentest Tools Github
- What Is Hacking Tools
- Easy Hack Tools
- Hack Tools Mac
- Hacking Tools For Mac
- Hacking Tools Software
- Pentest Tools Alternative
- Hacker Tools For Windows
- Hacker Tools Apk Download
- Pentest Tools For Android
- Hack Apps
- Pentest Tools Find Subdomains
- Hacks And Tools
- Hack Tools For Windows
- Pentest Automation Tools
- Hacker Tools List
- Best Hacking Tools 2020
- Termux Hacking Tools 2019
- Hack Tools Online
- How To Hack
- Hacker Tools Software
- Hacker Tools Mac
- Pentest Tools
- Pentest Tools Android
- Install Pentest Tools Ubuntu
- Hacking Tools Free Download
- Hacking Tools Windows 10
- Hack Tools Online
- Hacker Techniques Tools And Incident Handling
- Hack App
- Hacking Tools For Pc
- Hacker Tools Windows
- Beginner Hacker Tools
- New Hacker Tools
- Hacking Tools For Windows 7
- Pentest Recon Tools
- Pentest Tools Linux
- Github Hacking Tools
- How To Make Hacking Tools
- Hacker Tools 2020
- Tools Used For Hacking
- What Is Hacking Tools
- Blackhat Hacker Tools
- Pentest Tools Download
- Computer Hacker
- Hacking Tools And Software
- Hack Tools For Ubuntu
- Hacker Tools Github
- Hack Tools Mac
- Github Hacking Tools
- Underground Hacker Sites
- Pentest Box Tools Download
- Hacking Tools Free Download
- Best Pentesting Tools 2018
- Hacker Tools List
- Hacking Tools 2020
- Hacker Tools 2019
- Pentest Tools Subdomain
- Hack Tools 2019
- What Are Hacking Tools
- Hacking Tools Online
- Hacking Tools For Windows Free Download
- Hacker Tools For Ios
- Hacking Tools
- Hacking Tools 2019
- Pentest Tools Github
- Hack Tools For Windows
- Hacker Tools
- Github Hacking Tools
- Pentest Tools Windows
- Hacking Tools For Games
- Hackers Toolbox
- Pentest Tools Free
- Growth Hacker Tools
- Github Hacking Tools
- Hack Tools For Windows
- Hack Tool Apk
- Hack Tools Mac
- Best Pentesting Tools 2018
- What Are Hacking Tools
- New Hacker Tools
- Hack Tools
- Hack And Tools
- Pentest Tools Website Vulnerability
- Hacker Tools For Windows
- Hacker Tools
- Nsa Hack Tools
- Hacker Tools For Pc
- Pentest Tools Subdomain
- Pentest Tools Find Subdomains
- Hacker Tools Free Download
- Pentest Tools Windows
- Hacking Tools Software
- Hacker Tools Free
- New Hacker Tools
- Hacking Tools 2019
- Hacking Tools Pc
- Pentest Tools Framework
- Wifi Hacker Tools For Windows
- Hackrf Tools
- Nsa Hacker Tools
- Hacking Apps
- Hacks And Tools
- Hack Tools
- Usb Pentest Tools
- Hacking Tools Hardware
- Pentest Automation Tools
- Pentest Tools Website
- How To Make Hacking Tools
- Pentest Reporting Tools
- Hacking Tools
Nenhum comentário:
Postar um comentário