What is reconnaissance in ethical hacking?
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
Related posts
- Hacking Tools For Windows
- Pentest Tools Subdomain
- Pentest Tools Nmap
- Pentest Tools Open Source
- Best Pentesting Tools 2018
- Hak5 Tools
- Nsa Hack Tools Download
- Hacker Tools 2019
- Pentest Tools Website Vulnerability
- Hack Tools Online
- Hacking Tools For Beginners
- Hacker Tools Github
- Hacking Tools 2019
- Hacking Tools Pc
- Hacker Tools Apk
- Hacking Tools For Windows
- Hackers Toolbox
- Nsa Hack Tools
- Pentest Tools Subdomain
- Pentest Tools Open Source
- Hack Tools 2019
- Android Hack Tools Github
- Hacking Tools For Windows 7
- Pentest Tools
- Hack Tools
- Pentest Box Tools Download
- Pentest Tools Download
- Hacking Tools For Mac
- Tools Used For Hacking
- Hacker Tools For Windows
- Pentest Tools Url Fuzzer
- Pentest Tools Website
- Hacking Tools Mac
- Hack Tools For Games
- Hack Tools
- Pentest Tools For Ubuntu
- Physical Pentest Tools
- Hacker Tools 2020
- Best Pentesting Tools 2018
- Hackrf Tools
- Physical Pentest Tools
- Best Hacking Tools 2019
- Pentest Tools List
- Tools For Hacker
- Hacker Tools Apk Download
- Pentest Tools Find Subdomains
- Hacking Tools For Windows
- Hack Rom Tools
- World No 1 Hacker Software
- Pentest Tools Free
- World No 1 Hacker Software
- Pentest Tools Website Vulnerability
- Hacking Apps
- Physical Pentest Tools
- Hack Tools For Mac
- Hacker Techniques Tools And Incident Handling
- Hacker Tools Software
- Hacking Tools Software
- Pentest Tools Website
- Hackrf Tools
- Hacker Tools For Mac
- Hack Tools Mac
- Pentest Tools Kali Linux
- Hacker Tools Free Download
- Wifi Hacker Tools For Windows
- Hacking Tools Windows 10
- Hacker Tools Free
- Hacker Tools For Mac
- Pentest Tools For Android
- Pentest Tools Open Source
- Pentest Tools Bluekeep
- Pentest Tools Android
- Pentest Tools Apk
- Hack Website Online Tool
- Easy Hack Tools
- Hack Tools 2019
- Hacking Tools For Pc
- Hacker Tools For Pc
- Hacker Tools 2020
- Hack Tools 2019
- World No 1 Hacker Software
- Hack Tools
- Hacker Hardware Tools
- Tools Used For Hacking
- Pentest Tools Subdomain
- Hack Tool Apk
- What Are Hacking Tools
- Pentest Tools For Ubuntu
- Hack Tools Online

No comments:
Post a Comment