What is reconnaissance in ethical hacking?
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
Related posts
- Hacking Tools Windows
- Hack Tools Online
- Pentest Tools Find Subdomains
- Hack Website Online Tool
- Hack Tools
- Black Hat Hacker Tools
- What Is Hacking Tools
- Pentest Tools Subdomain
- Pentest Tools Github
- Best Hacking Tools 2019
- Hacking Tools
- Hack Tools For Windows
- Hacking App
- Pentest Tools Review
- Pentest Tools Url Fuzzer
- How To Hack
- Easy Hack Tools
- Hackrf Tools
- Pentest Recon Tools
- Pentest Tools Kali Linux
- Best Pentesting Tools 2018
- Hack Tools For Ubuntu
- Hacker Tools Free Download
- Hacker Tools Github
- Computer Hacker
- Hacker Tools Software
- Hacking Tools 2020
- Best Hacking Tools 2020
- Pentest Tools Framework
- Hacker Tools Apk
- Hacking Tools Online
- Hacking Tools For Pc
- Pentest Tools For Android
- Hacking Tools For Games
- Hacks And Tools
- Beginner Hacker Tools
- Nsa Hack Tools Download
- Hacker Hardware Tools
- Game Hacking
- Hacks And Tools
- Hack Tools For Mac
- Underground Hacker Sites
- Pentest Tools Subdomain
- Pentest Tools
- Best Pentesting Tools 2018
- Pentest Tools For Windows
- Hacking App
- Kik Hack Tools
- Hacking Tools For Pc
- Hack Tools Mac
- Top Pentest Tools
- Hacker Tools Apk Download
- Tools For Hacker
- Hacker Tools Apk Download
- Wifi Hacker Tools For Windows
- Hack Tools For Ubuntu
- Pentest Tools Android
- Pentest Tools Subdomain
- Hack Rom Tools
- Easy Hack Tools
- Hacker Tools For Ios
- Pentest Reporting Tools
- Hacker Tools Mac
- Hak5 Tools
- Pentest Tools Subdomain
- Pentest Tools Windows
- Hackrf Tools
- Hacker Tools
- Hack And Tools
- Hacking Tools Free Download
- Kik Hack Tools
- Hacking Tools Pc
- Hacker Tools 2020
- Hacker Tools For Ios
- Hack Tools For Ubuntu
- Hacking Tools 2020
- Top Pentest Tools
- Hacker Tools Mac
- Hack Tools For Pc
- Hacking Tools Download
- Termux Hacking Tools 2019
- Hacking Tools For Kali Linux
- Pentest Tools Website
- Hacking App
- Github Hacking Tools
- Hacker Tools Online
- Termux Hacking Tools 2019
- Pentest Tools Windows
No comments:
Post a Comment