Ethical Hacking - Reconnaissance-ethicalhackerorg.tk
Collecting information and knowing the target system is the first process in moral hacking. A group of reconnaissance process and techniques (Footprinting, Scanning & Enumeration), which is used to secretly find and gather information about the target system.
*Gather early information
*Determine the network range
*Identify active machines
*Discover open ports and access points
*Fingerprint the operating system
*Highlight services on ports
*Map Network
*We will discuss all these steps in detail in later chapters of this tutorial. Reconciliation occurs in two parts - active reconnaissance and passive reconnaissance.
Idle reconnaissance
In this process, you will not be connected directly to the computer system. This process is used to collect the necessary information without interacting with the target system.
Ethical Hacking - Reconnaissance
During reconnaissance, an ethical hacker tries to gather as much information about a targeted system, after the seven steps listed below -*Gather early information
*Determine the network range
*Identify active machines
*Discover open ports and access points
*Fingerprint the operating system
*Highlight services on ports
*Map Network
*We will discuss all these steps in detail in later chapters of this tutorial. Reconciliation occurs in two parts - active reconnaissance and passive reconnaissance.
Active reconnaissance
In this process, you will contact the computer system directly to obtain information. This information can be relevant and accurate. But if you are planning an active reconnaissance without permission, then there is a danger of finding it. If you have come to know, then the system admin can take serious action against you and stop your subsequent activities.Idle reconnaissance
In this process, you will not be connected directly to the computer system. This process is used to collect the necessary information without interacting with the target system.
Post a Comment