What is reconnaissance in ethical hacking?
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
Related articles
- Pentest Tools Tcp Port Scanner
- Hack Rom Tools
- Hack Tools For Windows
- Hack Tools Mac
- Hacking Tools For Windows
- Tools Used For Hacking
- Hack Tools For Mac
- Hak5 Tools
- How To Make Hacking Tools
- Pentest Box Tools Download
- Hacker Tools Hardware
- Hacking Tools Free Download
- Hack Tool Apk
- Hacking Tools For Windows
- Beginner Hacker Tools
- Hack Tool Apk
- Nsa Hack Tools
- Hacker Tools List
- Nsa Hack Tools
- Tools Used For Hacking
- Hacker Tools Github
- Hacking Tools For Kali Linux
- Pentest Tools Subdomain
- Pentest Box Tools Download
- Hacker Tools Free Download
- Hack Tools For Ubuntu
- Game Hacking
- Hacker Techniques Tools And Incident Handling
- Hacker Search Tools
- Easy Hack Tools
- Best Pentesting Tools 2018
- Hacking Tools Windows
- Ethical Hacker Tools
- Hack Tools For Pc
- Beginner Hacker Tools
- Hacking Tools Windows
- Pentest Tools Nmap
- Ethical Hacker Tools
- Hacking Tools 2020
- Top Pentest Tools
- Hack Tools
- Pentest Tools Free
- Pentest Tools For Android
- Kik Hack Tools
- Hack Tools For Windows
- Hacker Tools Github
- Pentest Tools Online
- Bluetooth Hacking Tools Kali
- Hacking App
- How To Install Pentest Tools In Ubuntu
- Hacker Tools For Ios
- Nsa Hack Tools Download
- Pentest Tools Review
- Hacker Tools List
- Hack App
- Hacking Tools Windows
- Underground Hacker Sites
- Pentest Tools List
- Hacker Tools 2020
- Hacking Tools
- Hack Apps
- Hacker Tools For Mac
- Hacking Tools
- Hacker Tools Apk Download
- Hacker Tools Apk
- How To Hack
- How To Make Hacking Tools
- Hacking Tools Github
- Nsa Hacker Tools
- Pentest Tools Website
- Hak5 Tools
- Hack Tools Pc
- Physical Pentest Tools
- Hacking Tools Usb
- Hacking Tools For Mac
- Pentest Tools For Mac
- Hacker Tools For Pc
- Hack Tool Apk No Root
- Pentest Tools For Windows
- Pentest Tools Port Scanner
- Nsa Hack Tools Download
- Pentest Tools For Windows
- Pentest Tools Open Source
- Hacking Tools For Games
- Pentest Tools For Android
- Ethical Hacker Tools
- Hacking Tools For Windows 7
- Pentest Tools For Ubuntu
- Hack Tools For Windows
- Pentest Tools Android
- Hacker Tools Apk
- Hacker Tool Kit
- Hacking Tools Software
- Hacking Tools Download
- Pentest Tools Android
- Pentest Automation Tools
- Hacker
- Hacker
- Pentest Reporting Tools
No comments:
Post a Comment