What is reconnaissance in ethical hacking?
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
Related links
- Hacker Techniques Tools And Incident Handling
- Hacking Tools For Kali Linux
- New Hacker Tools
- Hack Tools
- Pentest Tools Kali Linux
- Hacker Tools For Ios
- Free Pentest Tools For Windows
- Hacking Tools For Pc
- Hack Tools For Windows
- Pentest Tools Alternative
- Hacking Tools Usb
- Kik Hack Tools
- Pentest Tools Tcp Port Scanner
- World No 1 Hacker Software
- Hacker Tools Github
- Hacker Tools Linux
- Hacker
- Pentest Tools For Windows
- Hack Tools Online
- Pentest Tools Linux
- Hack Tools For Mac
- Kik Hack Tools
- Pentest Tools Free
- Hack Tools Mac
- Usb Pentest Tools
- Hacker Tools Free Download
- Pentest Tools Framework
- Pentest Tools Port Scanner
- Hacking Tools For Kali Linux
- Hacker Tools Mac
- Hacker Tools For Windows
- Hack Tools For Games
- Hacker Security Tools
- Hacking Tools Free Download
- Install Pentest Tools Ubuntu
- Hacker Tools 2020
- Blackhat Hacker Tools
- Game Hacking
- Pentest Recon Tools
- Pentest Tools Android
- Hacker Tools Free Download
- Hacker Tools For Pc
- Hack Tools For Mac
- Hacker Tools For Pc
- Easy Hack Tools
- Pentest Tools List
- Hacking App
- Pentest Tools Apk
- Hacker
- Hacker Tools List
- Free Pentest Tools For Windows
- Pentest Box Tools Download
- Hacker Search Tools
- Hack Tools
- Tools 4 Hack
- Hack Tools Download
- Hacking Tools For Mac
- Hacker Tools Linux
- Hacker Tools Linux
- Hacker Tools For Windows
- Hack Apps
- Hacker Tools Hardware
- Pentest Tools Online
- Hack Tools Pc
- Top Pentest Tools
- Hacker Tools For Windows
- Hackrf Tools
- Hack Tools
- How To Make Hacking Tools
- Pentest Tools For Mac
- Hacker Tools Software
- What Are Hacking Tools
- Kik Hack Tools
- New Hack Tools
- Beginner Hacker Tools
- Pentest Automation Tools
- Hack Tools Online
- Pentest Tools Website Vulnerability
- Hacker Hardware Tools
- Hack Tools For Games
- Physical Pentest Tools
- Nsa Hack Tools
- Pentest Tools For Mac
- Physical Pentest Tools
- Hacker Security Tools
- Hacking Tools For Windows
- What Is Hacking Tools
- New Hack Tools
- Hack And Tools
- Hacking Tools Usb
- Hacking Tools For Mac
- Hacker Tools Mac
- Hacking App
- Hacker Tools 2019
- Hacking Tools Download
0 件のコメント:
コメントを投稿