What is reconnaissance in ethical hacking?
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
More articles
- Hacking Tools Hardware
- Pentest Tools Github
- Wifi Hacker Tools For Windows
- Hacking Tools Online
- Hack App
- What Are Hacking Tools
- Hacking Tools For Windows Free Download
- Hacking Tools Kit
- Hack Tools For Windows
- Hacking Tools Mac
- Hack Tools Online
- Hack Apps
- Hacker Tools Github
- Hacker Tools Github
- Pentest Tools Website Vulnerability
- Best Pentesting Tools 2018
- Ethical Hacker Tools
- Pentest Reporting Tools
- Pentest Tools Windows
- What Are Hacking Tools
- How To Install Pentest Tools In Ubuntu
- Hacking Tools Name
- Hacking Tools 2020
- Pentest Tools Tcp Port Scanner
- Hacking Tools For Windows
- Hacking Tools Usb
- Hack Rom Tools
- Pentest Box Tools Download
- Hacker Security Tools
- Game Hacking
- New Hack Tools
- Hackrf Tools
- New Hack Tools
- Hacker Tools Apk
- Hack Website Online Tool
- Hacking Tools For Kali Linux
- Nsa Hack Tools
- Hack Tools Online
- Hacker Tools Windows
- Best Pentesting Tools 2018
- Hack Tool Apk
- Computer Hacker
- Hacking Tools Download
- Pentest Tools For Mac
- Hacks And Tools
- Hack Tools Mac
- Hacker Tools Online
- Pentest Tools Review
- Hacking Tools Hardware
- Hack Website Online Tool
- Hacking Tools For Games
- Best Hacking Tools 2020
- Pentest Tools Android
- Hacking Tools Name
- Black Hat Hacker Tools
- Hacker Tools Windows
- Hacking Tools Windows 10
- Black Hat Hacker Tools
- Hacking Tools Windows
- Hacking Tools For Windows Free Download
- Hack Tools Github
- Beginner Hacker Tools
- Hack Tool Apk No Root
- Hacker Tools For Ios
- Hack Tools For Pc
- Hacker Tool Kit
- Hack Tools For Mac
- Pentest Tools Download
- Hacker Security Tools
- Hacking Tools Download
- Pentest Tools Open Source
- Hacking Apps
- What Are Hacking Tools
- Hacking Apps
- Pentest Tools Download
- Hacker Tools Online
- Hack Tools Pc
- Pentest Tools Free
- Tools 4 Hack
- Hacker Tools Linux
- Hacker Tools For Ios
- Pentest Recon Tools
- Tools Used For Hacking
- Hacker Tools For Pc
- Pentest Tools For Android
- Best Hacking Tools 2019
- Hack Tools For Windows
- Hacking Tools Software
- What Is Hacking Tools
- Pentest Tools Open Source
- Best Pentesting Tools 2018
- Hacker Tools Free Download
- Hack Tools Mac
- Hacking Tools 2020
- Pentest Recon Tools
- Hacker Tools Linux
- Top Pentest Tools
- Hack Tools For Ubuntu
- Pentest Tools For Android
- Hacking Tools Download

No comments:
Post a Comment