What is reconnaissance in ethical hacking?
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
Related news
- Pentest Tools Website Vulnerability
- Hacking Tools Kit
- Pentest Tools Nmap
- Hack Tools For Games
- New Hacker Tools
- Growth Hacker Tools
- Hacker Tools Software
- Computer Hacker
- Hacker Search Tools
- Pentest Tools Nmap
- Beginner Hacker Tools
- Hacking Tools Mac
- Hacking Tools For Windows 7
- Hacking Tools For Beginners
- Pentest Tools Apk
- Hacking Tools For Mac
- Hacker Tools Software
- Pentest Tools Url Fuzzer
- Pentest Tools Website Vulnerability
- Hacking Tools Pc
- Hacker Tools Online
- Hacking Tools 2019
- Hacker Tools Apk Download
- Hacking Tools Software
- Hack Tools
- Pentest Automation Tools
- Hack Tools For Pc
- Usb Pentest Tools
- Hacking Tools And Software
- Easy Hack Tools
- Pentest Recon Tools
- Hack Tools Mac
- Hack Rom Tools
- Hacking Tools Free Download
- New Hacker Tools
- Tools Used For Hacking
- Hacking Tools 2019
- Hacker Tools For Pc
- Hack Tools For Mac
- Hacking Tools 2019
- Hacking Tools For Windows Free Download
- Nsa Hack Tools
- Hack Tools For Games
- Hackrf Tools
- Best Pentesting Tools 2018
- Hacking Tools For Windows 7
- Hacking Tools Windows
- Pentest Automation Tools
- Pentest Tools For Android
- Hacking Apps
- Hack Website Online Tool
- Hacking Tools Mac
- Hack Tools For Ubuntu
- Pentest Tools Url Fuzzer
- Hacking Tools For Kali Linux
- Pentest Tools Kali Linux
- Hacking Tools Download
- Pentest Reporting Tools
- Blackhat Hacker Tools
- Easy Hack Tools
- Tools 4 Hack
- Pentest Tools For Mac
- Pentest Tools Apk
- Hacking Tools 2019
- What Are Hacking Tools
- Hack Tools Pc
- Hack App
- Pentest Tools Download
- What Are Hacking Tools
- Hacker Tools 2019
- Termux Hacking Tools 2019
- Hacker Tools Linux
- Hacker Search Tools
- Best Hacking Tools 2020
- Hacking Tools Windows
- Pentest Tools Port Scanner
- Pentest Tools Url Fuzzer
- Tools Used For Hacking
- Pentest Tools Online
- Hacking Tools For Beginners
- Pentest Tools Nmap
- Underground Hacker Sites
- Free Pentest Tools For Windows
- Pentest Tools Review
- Blackhat Hacker Tools
- Pentest Recon Tools
No comments:
Post a Comment