What is reconnaissance in ethical hacking?
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
Related articles
- Free Pentest Tools For Windows
- Pentest Tools Apk
- Hacking Tools For Kali Linux
- Best Hacking Tools 2020
- Termux Hacking Tools 2019
- Pentest Tools For Mac
- Pentest Tools Alternative
- Hacking Tools Online
- Hacking Apps
- Wifi Hacker Tools For Windows
- Pentest Tools Port Scanner
- Underground Hacker Sites
- Hack Tools Pc
- Hacking Tools Pc
- Hacker Tools For Windows
- Usb Pentest Tools
- Hacking Tools 2019
- Hack App
- Hacker Tools For Pc
- Hacking Tools For Mac
- Hack App
- Pentest Tools Website
- Pentest Tools Tcp Port Scanner
- How To Install Pentest Tools In Ubuntu
- Hacker Tools For Ios
- Hacker Tools For Windows
- Hacking Tools Usb
- Hacking Tools Windows
- Hacker Tools Software
- Best Hacking Tools 2019
- Hacker Tools Mac
- Best Hacking Tools 2020
- Pentest Tools Free
- Hacking Tools Free Download
- Hacker Tools Free Download
- Hacker Tools Apk Download
- Pentest Automation Tools
- Hacking Tools Windows 10
- Pentest Tools Windows
- Hacking Tools Free Download
- Hacking Tools Free Download
- Hack Tools
- Hacker Tools Software
- Beginner Hacker Tools
- Bluetooth Hacking Tools Kali
- Pentest Tools Subdomain
- Hacking App
- Tools Used For Hacking
- Hacking Tools For Windows 7
- Hacker Search Tools
- Hacker Tools List
- Usb Pentest Tools
- Hacking Tools For Pc
- Hack Tools For Games
- Hack Tool Apk
- Pentest Tools Online
- Top Pentest Tools
- Hacking Tools Software
- Hacker Tools Mac
- Hack Tools For Mac
- Pentest Tools Alternative
- What Is Hacking Tools
- What Is Hacking Tools
- Hack Tools
- Android Hack Tools Github
- Hacker Tool Kit
- Hacker Tools Apk Download
- Blackhat Hacker Tools
- Pentest Box Tools Download
- Hack And Tools
- World No 1 Hacker Software
- Hacker Tools Apk Download
- Hacking Tools 2019
- Hacker Tools Windows
- Hacking Tools Windows
- Hacking Tools For Pc
- Hack Tools Mac
- Hack Tools 2019
- Hacker Tools Apk Download
- Hack Apps
- Hack Tools For Games
- What Are Hacking Tools
- Hack Tools Download
- Hacking Tools For Windows
- Pentest Tools Subdomain
- Hacker Tools Free Download
- Hacking Apps
- Hacking Tools Usb
- Hacker Tools Linux
- Hack Tool Apk No Root
- Hack Tool Apk No Root
- Pentest Tools List
- Hacking Tools 2019
- Pentest Tools Find Subdomains
- Hackrf Tools
- New Hack Tools
- Termux Hacking Tools 2019
- Pentest Tools For Mac
- Hack Tools Pc
- New Hack Tools
No comments:
Post a Comment