What is reconnaissance in ethical hacking?
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
Related articlesThis is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
- Hacks And Tools
- Pentest Tools Kali Linux
- Hacking Tools And Software
- Best Pentesting Tools 2018
- Pentest Tools For Windows
- Pentest Tools Find Subdomains
- Hacker Tools Apk
- Hack Tools Download
- Hack Apps
- Hacking Tools Mac
- Hackers Toolbox
- Termux Hacking Tools 2019
- Hacking Tools Hardware
- Pentest Tools Windows
- Hacker Search Tools
- Pentest Tools Review
- Hacker Tools For Windows
- Tools 4 Hack
- Hackrf Tools
- What Is Hacking Tools
- Hacker Search Tools
- Hacker Tools Github
- Bluetooth Hacking Tools Kali
- Nsa Hack Tools Download
- Hack Tools
- Hack Tools Pc
- Hacker Tools Apk Download
- Hack Tools For Mac
- Top Pentest Tools
- Hacking Tools For Windows
- How To Install Pentest Tools In Ubuntu
- Pentest Tools Online
- Hacking Tools For Kali Linux
- How To Hack
- Hacker Security Tools
- Hack Tools For Mac
- Best Hacking Tools 2020
- Hacking Tools And Software
- Easy Hack Tools
- Best Hacking Tools 2019
- Hacker Tools For Windows
- Hacking Tools For Windows
- Pentest Tools Website Vulnerability
- Usb Pentest Tools
- Pentest Tools
- Hacking Tools Download
- Hack Tools Pc
- Bluetooth Hacking Tools Kali
- Pentest Tools Open Source
- Hacker Tools Linux
- How To Make Hacking Tools
- Best Hacking Tools 2019
- Hacker Tools For Pc
- Pentest Tools Open Source
- Tools 4 Hack
- Nsa Hack Tools Download
- Easy Hack Tools
- Hack Tools
- Hack And Tools
- Install Pentest Tools Ubuntu
- Hacker Tools Windows
- Hacking Tools For Mac
- Hacks And Tools
- Pentest Tools Subdomain
- Hack Tool Apk
- Hack Tool Apk No Root
- Pentest Box Tools Download
- Best Pentesting Tools 2018
- Best Hacking Tools 2019
- Hacking Tools 2020
- Termux Hacking Tools 2019
- Hacking Tools
- Hack Tools For Mac
- Pentest Tools Subdomain
- Pentest Tools Download
- Physical Pentest Tools
- Hack Tool Apk No Root
- Hacking Apps
- Pentest Tools Open Source
- Hacker Tools 2019
- Install Pentest Tools Ubuntu
- Pentest Tools Nmap
- Hacking Tools
- Pentest Tools Linux
- Hacker Tools Github
- Usb Pentest Tools
- Hacking Tools Windows 10
- Hackers Toolbox
- Pentest Tools Windows
- Hacking Tools Pc
No hay comentarios:
Publicar un comentario