What is reconnaissance in ethical hacking?
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
Continue reading
- Hack Tools Download
- Hacking Tools Windows 10
- Pentest Tools For Windows
- Hacker Techniques Tools And Incident Handling
- Beginner Hacker Tools
- Growth Hacker Tools
- Hacking Tools For Windows Free Download
- Hacker Tools Apk Download
- What Is Hacking Tools
- How To Install Pentest Tools In Ubuntu
- Hacking Tools Software
- Hack Tools Github
- Pentest Tools For Mac
- Hacker Tools 2019
- Hack Tools
- Pentest Tools Github
- Pentest Tools Alternative
- Hacker Hardware Tools
- Hackrf Tools
- Free Pentest Tools For Windows
- Pentest Recon Tools
- Hack Tools For Windows
- Hacker Tools Github
- Wifi Hacker Tools For Windows
- Hacker Hardware Tools
- Pentest Tools Framework
- Hacker Tools Apk Download
- Hacking Tools Windows 10
- Hacking Tools Hardware
- Pentest Tools For Windows
- Hacking Tools For Windows Free Download
- Hacker Tools Hardware
- Computer Hacker
- Hacker
- Hacker Tools
- Hacker Tools Apk Download
- Bluetooth Hacking Tools Kali
- Hacker Tools Free Download
- Pentest Automation Tools
- Game Hacking
- Hacker Tools Software
- Nsa Hacker Tools
- Hacker Tools For Ios
- Hacking Tools Pc
- Pentest Tools List
- Hacking Tools Software
- Hack Tool Apk No Root
- Pentest Box Tools Download
- Pentest Tools For Android
- Hacking Tools For Kali Linux
- Hacking Tools Online
- Pentest Tools Apk
- Hacker Security Tools
- Pentest Tools Framework
- Best Hacking Tools 2019
- Hacker Hardware Tools
- Pentest Tools Alternative
- Hacking Tools Windows
- Hacking Tools Online
- New Hack Tools
- Hack Tools Mac
- Pentest Tools For Ubuntu
- Hacker Tools Apk
- Hacker
- New Hacker Tools
- Hacking Tools For Mac
- Hacking Tools For Games
- Hacking Tools Download
- Hacking Tools For Games
- Hacker Techniques Tools And Incident Handling
- Hacking Tools For Windows 7
- Pentest Tools Subdomain
- Hacking Tools For Kali Linux
- What Is Hacking Tools
- Hacker Tools
- Pentest Tools Kali Linux
- Hacking Tools Download
- Hack Tools Download
- Android Hack Tools Github
- Best Hacking Tools 2019
- Hackers Toolbox
- Hack Tools For Ubuntu
- Computer Hacker
- Pentest Tools Find Subdomains
- Pentest Box Tools Download
- Android Hack Tools Github
- Pentest Reporting Tools
- Hacking Tools Online
- Best Hacking Tools 2020
- Hacking Tools For Beginners
- Hacking App
- Pentest Tools Download
No comments:
Post a Comment