What is reconnaissance in ethical hacking?
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
Related articles
- Tools Used For Hacking
- Underground Hacker Sites
- Pentest Tools Alternative
- Physical Pentest Tools
- Hacking Tools Windows
- Pentest Tools For Mac
- Pentest Reporting Tools
- Hacker
- Pentest Tools Android
- What Are Hacking Tools
- Hacking Tools For Windows
- Hacker Techniques Tools And Incident Handling
- Github Hacking Tools
- Hacking Tools Github
- Hacker Security Tools
- Physical Pentest Tools
- Hacking Tools Pc
- Hacker Tools For Ios
- Hacker Tools Hardware
- Hackrf Tools
- Tools For Hacker
- Hack Tools For Games
- Hacker Techniques Tools And Incident Handling


Nenhum comentário:
Postar um comentário