What is reconnaissance in ethical hacking?
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
Related links
- Hack Tools Download
- Hack Tools Github
- Hack Tools Github
- Hack Tools For Mac
- Hacking Tools Mac
- Hacking Tools Name
- Bluetooth Hacking Tools Kali
- Hacker Tools Github
- Pentest Tools Nmap
- Hacker Security Tools
- Computer Hacker
- Pentest Tools For Ubuntu
- Install Pentest Tools Ubuntu
- Github Hacking Tools
- Black Hat Hacker Tools
- Hacking Tools Mac
- Hacking Tools Github
- Hacking Tools Software
- Hacker Tools List
- Hacker Search Tools
- Pentest Box Tools Download
- Hack Tools For Windows
- Pentest Tools Website
- Hacking Tools For Windows Free Download
- Tools Used For Hacking
- How To Install Pentest Tools In Ubuntu
- Pentest Tools List
- Ethical Hacker Tools
- Hack Apps
- Pentest Automation Tools
- Hacking Tools For Pc
- Black Hat Hacker Tools
- Hacker
- Hacking Tools For Windows 7
- Hacking Tools Windows
- Hack Tools Online
- Pentest Tools Free
- Pentest Tools Website Vulnerability
- Hacking Tools Software
- Hacker Tools Github
- Hacking Tools For Windows Free Download
- Pentest Tools Port Scanner
- Beginner Hacker Tools
- Hacking App
- Hacker Tools Mac
- Hacker Tools For Mac
- Hacker Tools Linux
- Pentest Tools Apk
- Pentest Tools Url Fuzzer
- Best Hacking Tools 2019
- Pentest Tools Open Source
- Hacker Tools Hardware
- Hacking Tools
- Pentest Tools Find Subdomains
- Hacking Tools Hardware
- Hacking Tools Github
- Hack Tools Pc
- Hacking Tools Usb
- Hack Tools For Windows
- Pentest Tools Review
- Hacking Tools Pc
- New Hacker Tools
- Pentest Automation Tools
- Hacker Tools For Ios
No hay comentarios:
Publicar un comentario