What is reconnaissance in ethical hacking?
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
More articles
- Hacker Tool Kit
- Hacker Tools List
- Pentest Tools For Windows
- Pentest Box Tools Download
- Hak5 Tools
- Pentest Tools For Windows
- Hacker Tools Software
- Hacker Search Tools
- Hack Tools Github
- Easy Hack Tools
- Free Pentest Tools For Windows
- Hack Apps
- Hacking Tools Windows 10
- Game Hacking
- Hack Tools Online
- Install Pentest Tools Ubuntu
- Hacker Hardware Tools
- Termux Hacking Tools 2019
- Pentest Tools Tcp Port Scanner
- Pentest Tools Find Subdomains
- Hacker Tools Mac
- Pentest Tools Download
- Pentest Tools Kali Linux
- Hacking Apps
- Hack Tools
- Hacker Tools Online
- Tools For Hacker
- Hackrf Tools
- How To Install Pentest Tools In Ubuntu
- New Hack Tools
- Hack Tools Github
- Hack Website Online Tool
- Bluetooth Hacking Tools Kali
- Hak5 Tools
- Black Hat Hacker Tools
- Hacking Tools And Software
- Github Hacking Tools
- Pentest Tools For Android
- Pentest Tools Download
- Hacker Tool Kit
- Hacking Tools Name
- Hack Tools Online
- Hacker Techniques Tools And Incident Handling
- Hacker Tools For Windows
- Tools 4 Hack
- Hacking Tools Pc
- Hacking Tools Free Download
- Pentest Tools Find Subdomains
- Computer Hacker
- Hacker Tools For Mac
- Pentest Tools For Windows
- Pentest Tools For Mac
- Pentest Tools Framework
- Tools For Hacker
- Hacking Apps
- Android Hack Tools Github
- Hack Rom Tools
- Tools 4 Hack
- Hacking Tools For Games
- Hacking Tools And Software
- Hack Tool Apk No Root
- Hacking Tools For Windows Free Download
- Hacking Tools Pc
- Pentest Tools Nmap
- Pentest Tools Linux
No comments:
Post a Comment