What is reconnaissance in ethical hacking?
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
Related word
- Hacking Tools Mac
- Pentest Tools Download
- Hacking Tools Windows 10
- Hacker Tools Github
- Hacking Tools
- Hacker Tools Software
- Hack Tools For Ubuntu
- Pentest Tools Alternative
- Pentest Tools Kali Linux
- Pentest Automation Tools
- Nsa Hacker Tools
- Hacking Apps
- Nsa Hacker Tools
- Hak5 Tools
- Pentest Tools Kali Linux
- Hack Apps
- Pentest Tools Url Fuzzer
- Usb Pentest Tools
- Pentest Tools For Ubuntu
- Pentest Tools Linux
- Usb Pentest Tools
- Hack Tool Apk No Root
- Hack Tools For Ubuntu
- Pentest Box Tools Download
- Hacker Tools 2020
- Pentest Automation Tools
- Hack App
- What Are Hacking Tools
- Underground Hacker Sites
- Pentest Tools Find Subdomains
- How To Make Hacking Tools
- Hacking Tools Download
- Pentest Tools Online
- Pentest Tools For Ubuntu
- Hacking Tools 2019
- Hack Tool Apk No Root
- Hacker Tools Hardware
- Hacker Tools
- Hacker Tools Hardware
- Pentest Tools Website Vulnerability
- Pentest Tools Kali Linux
- Hack Tools For Mac
- Hacker Tools Windows
- Ethical Hacker Tools
- Wifi Hacker Tools For Windows
- Hacker Tools For Windows
- Wifi Hacker Tools For Windows
- Hacking Tools For Pc
- Pentest Tools Review
- Hacker Search Tools
- Bluetooth Hacking Tools Kali
- Best Pentesting Tools 2018
- Termux Hacking Tools 2019
- Pentest Box Tools Download
- How To Make Hacking Tools
- Hacker Tools List
No comments:
Post a Comment