What is reconnaissance in ethical hacking?
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
More info
- Hacking Tools Download
- Ethical Hacker Tools
- Hacking Tools For Games
- Pentest Tools Website
- Hacker Tools Online
- Hack Tools Download
- Pentest Tools Download
- Hacking Tools For Games
- Hacking Tools Github
- Hack Tools Pc
- Pentest Tools List
- Pentest Tools Subdomain
- Top Pentest Tools
- Pentest Tools Framework
- Nsa Hack Tools
- Hacker Tools
- Hacker Tools 2020
- Hack Tools Download
- Android Hack Tools Github
- Pentest Automation Tools
- Free Pentest Tools For Windows
- Github Hacking Tools
- Hacking App
- Hack Tools For Windows
- Hack Tools Download
- Hacker Tools Hardware
- Hacking Tools 2020
- Pentest Tools Review
- Pentest Tools For Ubuntu
- Pentest Reporting Tools
- Hacking App
- Android Hack Tools Github
- Hack Tools For Pc
- Bluetooth Hacking Tools Kali
- Hacking Tools Kit
- Pentest Tools Online
- Pentest Automation Tools
- Hacker Tools Github
- Hack Tools
- Pentest Tools Online
- Hacking Tools Usb
- Pentest Tools Apk
- Pentest Tools For Mac
- Hacking Tools For Pc
- Pentest Tools Website Vulnerability
- Hacker Tools Github
- Hacking Tools Pc
- Hacking Tools For Windows 7
- Hacker Security Tools
- Nsa Hacker Tools
- Hacking Tools 2019
- Hacker Tools Apk
- Hacking Tools For Windows 7
- Hacking Tools Github
- Pentest Tools Apk
- Hack Tools For Pc
- Pentest Tools Online
- How To Install Pentest Tools In Ubuntu
- Pentest Tools Github
- Pentest Tools For Android
- Android Hack Tools Github
- Pentest Tools Free
- Hacking Tools For Windows Free Download
- Pentest Tools Download
- Hacker Tools
- Pentest Tools Free
- Wifi Hacker Tools For Windows
- Hacking Tools For Games
- Android Hack Tools Github
- Hacking Tools For Windows 7
- How To Make Hacking Tools
- Hacker Tools Github
- Best Hacking Tools 2019
- Hack Tools For Mac
- Hacking Tools And Software
- Hacking Tools For Pc
- Hacking Tools 2019
- Hack Tools
- Pentest Tools
- Hacker Tools For Mac
- Pentest Tools Apk
- Pentest Tools Subdomain
- Hacker Tools Online
- How To Hack
- Pentest Tools Linux
- Hacking Tools Software
- Hacker Tools Online
- Pentest Tools For Ubuntu
- Pentest Tools Online
- Top Pentest Tools
- Hack Tools Download
- Pentest Tools Android
No comments:
Post a Comment