What is reconnaissance in ethical hacking?
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
Read more
- Pentest Tools Bluekeep
- Hacking Apps
- Hack Tools 2019
- Wifi Hacker Tools For Windows
- Pentest Tools Github
- Hacker Tools Linux
- Pentest Tools For Ubuntu
- Pentest Reporting Tools
- Hacker Tools Mac
- Easy Hack Tools
- Hacking Tools Hardware
- New Hack Tools
- Hack Tools Download
- Pentest Automation Tools
- Pentest Tools Windows
- Pentest Tools Subdomain
- Usb Pentest Tools
- Hack Tools For Pc
- Pentest Tools For Mac
- Physical Pentest Tools
- Hacking Tools Free Download
- Kik Hack Tools
- Best Pentesting Tools 2018
- Hacker Security Tools
- Hack Tool Apk No Root
- Hacking Tools 2019
- Pentest Tools Website
- Hack Tools For Ubuntu
- Hacker Tools Linux
- Android Hack Tools Github
- Hacker Tools Hardware
- Hack And Tools
- Hacking Tools Usb
- Pentest Tools Online
- Hacking Tools Hardware
- Pentest Tools Linux
- Pentest Tools Windows
- Hack Tools For Games
- Nsa Hacker Tools
- Hacker Tools Free Download
- Hack Tools Pc
- Hacking Tools Windows 10
- Hacking Tools Hardware
- Free Pentest Tools For Windows
- Hacking Tools For Windows Free Download
- Hack Tools Pc
- Pentest Tools Online
- Hacking Tools Free Download
- Hacker Tools 2020
- Pentest Tools For Mac
- Hacker Tools 2019
- Hacker Tools Windows
- Growth Hacker Tools
- Hack Tools Github
- Hack Apps
- Hacker Tools Windows
- Pentest Tools Download
- Bluetooth Hacking Tools Kali
- World No 1 Hacker Software
- Hacker Security Tools
- Hacker Tools
- Pentest Tools For Mac
- Game Hacking
- Hack Tools For Pc
- Pentest Automation Tools
- Hack Tools
- Pentest Tools Port Scanner
- Hacker Tools
- Pentest Tools Free
- Pentest Tools Kali Linux
- Hacking Apps
- Hacker Tools Free
- Android Hack Tools Github
- Best Hacking Tools 2019
- Hacking Tools Windows
- How To Hack
- Hackers Toolbox
- Hacker Tools Free Download
- Pentest Tools For Android
- Hacker
- Pentest Reporting Tools
- Hack Tools For Mac
- Hacking Tools For Kali Linux
No hay comentarios:
Publicar un comentario