RECONNAISSANCE IN ETHICAL HACKING
What is reconnaissance in ethical hacking?
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
Related posts
- Github Hacking Tools
- Pentest Tools Find Subdomains
- Termux Hacking Tools 2019
- Pentest Tools For Windows
- Hack Website Online Tool
- New Hacker Tools
- Pentest Tools Apk
- Hackers Toolbox
- Pentest Tools Kali Linux
- Hacking Tools For Beginners
- Easy Hack Tools
- Hacker Techniques Tools And Incident Handling
- Pentest Tools Url Fuzzer
- New Hack Tools
- Pentest Tools
- How To Make Hacking Tools
- Hacker Tools Software
- Hack Website Online Tool
- Game Hacking
- Tools 4 Hack
- Pentest Tools Framework
- Hacker Tools Free Download
- Hacking Tools 2020
- Best Hacking Tools 2020
- Android Hack Tools Github
- Hacking Tools And Software
- Hack Tools 2019
- Pentest Tools Free
- Nsa Hacker Tools
- Pentest Tools For Mac
- Hacker Tools Apk
- Free Pentest Tools For Windows
- Hacking Tools For Windows Free Download
- Pentest Tools Url Fuzzer
- Pentest Tools Framework
- Hacker Tools For Pc
- Install Pentest Tools Ubuntu
- New Hack Tools
- Hack Tools
- Hack Tools
- Hacker Tools For Pc
- Hacking Tools For Windows 7
- Pentest Tools Free
- Pentest Tools For Android
- Pentest Tools Free
- Hack Tools For Mac
- World No 1 Hacker Software
- Hacker Tools Github
- Hacker Tools
- Hacking Tools Windows
- Hacker Tools Software
- Hack Tools Pc
- Hacking Tools Windows
- Hack Tools
- Hacking Tools
- Pentest Tools
- Hacker Search Tools
- Hacking Tools Free Download
- Hacker Hardware Tools
- Pentest Tools Kali Linux
- Black Hat Hacker Tools
- Tools 4 Hack
- Pentest Tools Port Scanner
- Hackers Toolbox
- Hack Tools For Mac
- Hack Tools For Ubuntu
- Pentest Tools List
- Pentest Tools Find Subdomains
- Pentest Tools Online
- Pentest Tools Open Source