What is reconnaissance in ethical hacking?
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
More articles
- Hack App
- Pentest Tools Android
- Hacker Hardware Tools
- Hacking Tools 2020
- Free Pentest Tools For Windows
- Hacker Tools For Windows
- Pentest Tools Tcp Port Scanner
- Pentest Tools
- Underground Hacker Sites
- Hack Tools For Ubuntu
- Wifi Hacker Tools For Windows
- Pentest Tools Find Subdomains
- Hacking Tools Usb
- Github Hacking Tools
- Hack Tools For Mac
- Pentest Tools Github
- Nsa Hack Tools
- Hack Tools For Windows
- Tools For Hacker
- Hack And Tools
- Hacking Tools 2020
- Usb Pentest Tools
- Pentest Reporting Tools
- Hacking Apps
- Pentest Tools Apk
- Hacking Tools For Pc
- Pentest Tools Review
- Hacker Tools
- Hacker
- Pentest Tools Apk
- Growth Hacker Tools
- Nsa Hack Tools
- Pentest Tools Find Subdomains
- Pentest Tools Review
- Tools 4 Hack
- Hacker Tools Hardware
- Physical Pentest Tools
- Hackers Toolbox
- Pentest Tools Subdomain
- Pentest Tools List
- Beginner Hacker Tools
- Hacker Tool Kit
- What Are Hacking Tools
- Pentest Tools Website Vulnerability
- Hacker Security Tools
- Nsa Hack Tools
- Hacking Tools Online
- Hacking Tools Mac
- Hacking Tools For Windows 7
- Pentest Tools For Android
- Pentest Tools Review
- Pentest Tools Bluekeep
- How To Make Hacking Tools
- Pentest Reporting Tools
- Game Hacking
- Hacking Tools For Windows
- Hack Tools For Mac
- Hack Rom Tools
- Hack Tools Mac
- Hacker Tools List
- Hacker Tools Online
- Pentest Tools Apk
- Hacker Tools Mac
- Hacker Tool Kit
- Hack Tools For Ubuntu
- Hack Rom Tools
- Pentest Tools For Ubuntu
- Android Hack Tools Github
- Bluetooth Hacking Tools Kali
- Pentest Box Tools Download
- Pentest Tools Linux
- Nsa Hack Tools
- Free Pentest Tools For Windows
- Hacking Tools For Pc
- Hacker Tools For Pc
- Hacking Tools Download
- Pentest Tools For Ubuntu
- Hack Tools For Mac
- Hack Tools For Pc
- Hacker Tools Online
- Hacker Tools List
- Best Pentesting Tools 2018
- Pentest Box Tools Download
- Hacker Techniques Tools And Incident Handling
- Hacking Tools For Windows
- Hacker Tools For Mac
- Best Pentesting Tools 2018
- Hacker Tools Software
- Hacker Search Tools
- Hacking Tools And Software
- Hak5 Tools
- Hack Apps
- Pentest Tools Github
- Nsa Hack Tools
- Hacking App
- Easy Hack Tools
- Hacking Tools
- Physical Pentest Tools
- Hack App
- Pentest Tools For Ubuntu
- Hackers Toolbox
- Hack Tool Apk

No comments:
Post a Comment