What is reconnaissance in ethical hacking?
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
More information
- Pentest Tools Website Vulnerability
- Hacker Tools Linux
- Hacker
- Growth Hacker Tools
- Hacker Tools Software
- Hacking Tools For Games
- Physical Pentest Tools
- Pentest Tools Android
- Hacker Tool Kit
- Pentest Tools Website Vulnerability
- Computer Hacker
- New Hacker Tools
- Nsa Hack Tools
- Hacker Tools 2020
- Hacker Tools For Windows
- Hacker Tools Linux
- Hacking App
- Hacking Tools Github
- Hacking Tools For Mac
- Pentest Recon Tools
- Pentest Tools Kali Linux
- Hacker Tools Online
- Hacking Apps
- Hack Tools For Pc
- Pentest Tools List
- Hacker Tools 2019
- Top Pentest Tools
- Hacking Tools And Software
- Hacking Tools Name
- Hack Apps
- Hacker
- Hacker Tools For Mac
- Pentest Tools Alternative
- Hack Tools Github
- Best Hacking Tools 2019
- Bluetooth Hacking Tools Kali
- Hacking Tools Software
- Hacking Tools Free Download
- Hacker Tools Apk Download
- Ethical Hacker Tools
- Pentest Recon Tools
- Pentest Tools Bluekeep
- Hacking Tools Name
- Tools 4 Hack
- Physical Pentest Tools
- Hacking Tools Pc
- Wifi Hacker Tools For Windows
- How To Make Hacking Tools
- World No 1 Hacker Software
- Pentest Tools For Windows
- Kik Hack Tools
- Hacking Tools Github
- Best Hacking Tools 2019
- Hacker Tools
- Hacking Tools For Windows
- Hacking Tools Name
- Hack Tools Mac
- Pentest Tools For Mac
- New Hacker Tools
- Pentest Tools Tcp Port Scanner
- Hacking Tools For Mac
- Hacking Tools Usb
- Growth Hacker Tools
- Top Pentest Tools
- Hacking Tools For Beginners
- Pentest Tools Alternative
- Pentest Tools Kali Linux
- Pentest Tools List
- Pentest Reporting Tools
- Hackers Toolbox
- Best Hacking Tools 2020
- Pentest Box Tools Download
- Pentest Tools List
- Hack Tool Apk No Root
- Pentest Tools
- Kik Hack Tools
- Pentest Tools For Ubuntu
- Pentest Tools Download
- Hacker Techniques Tools And Incident Handling
- Hacking Tools
- Pentest Tools Framework
- Pentest Tools Github
- New Hacker Tools
- Hacker Tools Free Download
- Pentest Tools Apk
- Hacking Tools Usb
- Hacker Tools Mac
- Hacking Tools Github
- Best Hacking Tools 2020
- Pentest Tools Apk
- Hack Website Online Tool
- Best Hacking Tools 2020
- Hacking App
No comments:
Post a Comment