What is reconnaissance in ethical hacking?
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
Related news
- Github Hacking Tools
- Hacking Tools Mac
- Hacking Tools Name
- Hacker Tools Hardware
- Hacking Tools For Mac
- Pentest Tools Download
- Hacker Tools Hardware
- Hacker Tools 2020
- Hacking Tools Hardware
- Hack Tools Pc
- Hacker Tools Apk Download
- Hacker
- Ethical Hacker Tools
- Hacking Apps
- New Hack Tools
- Hacking Tools Windows 10
- Hacking Tools Mac
- Hack And Tools
- Hacking Tools Hardware
- Hacking Tools For Pc
- Pentest Tools Tcp Port Scanner
- Hack Tools Download
- Pentest Tools Tcp Port Scanner
- Pentest Tools Review
- Hacking Tools For Windows 7
- Pentest Recon Tools
- Pentest Tools Download
- Pentest Tools Online
- Hacking Tools Windows 10
- Hacking Tools For Windows
- Hack Website Online Tool
- Ethical Hacker Tools
- Pentest Tools
- How To Make Hacking Tools
- Hacker Tools Github
- Wifi Hacker Tools For Windows
- Hacking Tools Name
- Hacking Tools For Games
- How To Make Hacking Tools
- Hack Tools For Ubuntu
- Hacker Tools Linux
- Pentest Automation Tools
- Hacking Tools Name
- Tools For Hacker
- Hacking Tools Github
- Black Hat Hacker Tools
- Hack Tools
- Pentest Tools Bluekeep
- Pentest Box Tools Download
- Pentest Tools For Ubuntu
- Hack Tools For Games
- Hacking Tools For Beginners
- Hacker Tools
- Hack Tools
- Hack Tools
- Hack Tools 2019
- Hack Tools Mac
- Hacking Tools For Pc
- Hacking Tools For Games
- Pentest Tools Github
- Tools Used For Hacking
- Game Hacking
- Free Pentest Tools For Windows
- Beginner Hacker Tools
- Hacks And Tools
- Hacking Tools And Software
- Termux Hacking Tools 2019
- Hack Tools For Mac
- Hacking Tools For Beginners
- Pentest Tools Nmap
- Hackers Toolbox
- Pentest Tools Online
- Hack Tools Mac
- Hacker Search Tools
- Pentest Reporting Tools
- Pentest Tools Github
- Pentest Tools Kali Linux
- Pentest Tools Android
- Hack Website Online Tool
- Pentest Tools For Ubuntu
- Pentest Tools Open Source
- Pentest Tools Url Fuzzer
- Hacking Tools 2019
- Hacker Tools For Ios
- Hack Tools
- Hacker Tools
- Pentest Tools Alternative
- Pentest Tools List
- Best Hacking Tools 2020
- Hack Tools Mac
- Hacking Tools For Beginners
- Github Hacking Tools
- Hack Tool Apk
- Hack Tools For Mac
- Pentest Tools Website
- Tools 4 Hack
- Hack Rom Tools
- Hacking Tools Software
- Hack Tools
- Hacking Tools Name
- How To Hack
- Kik Hack Tools
- Nsa Hacker Tools
- Hacker Techniques Tools And Incident Handling
- Hacker Tools Software
- Hacking Tools For Windows 7
- Beginner Hacker Tools
- Usb Pentest Tools
- Pentest Reporting Tools
- Hack Tools For Ubuntu
No comments:
Post a Comment