What is reconnaissance in ethical hacking?
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
More information
- Hack App
- Pentest Recon Tools
- Tools Used For Hacking
- Hack Tools Download
- Hackrf Tools
- Pentest Tools Website Vulnerability
- Pentest Tools Review
- Ethical Hacker Tools
- Hacking Tools Kit
- Nsa Hacker Tools
- Computer Hacker
- Bluetooth Hacking Tools Kali
- Hack And Tools
- Hack App
- Hacker Tools For Pc
- Hack Tools Mac
- Hacking Tools Windows
- Hacking Tools Hardware
- Hacker Tools List
- Hacker Techniques Tools And Incident Handling
- Pentest Tools Apk
- Hacking Tools For Windows 7
- Pentest Tools Online
- Hacking Tools Pc
- Beginner Hacker Tools
- Hacker Tools Apk Download
- Pentest Tools For Windows
- Pentest Tools Subdomain
- Pentest Tools Github
- Hacking Tools Name
- Ethical Hacker Tools
- Hacking Tools For Mac
- Hacking Tools Online
- Pentest Recon Tools
- Hacker Tools Mac
- Hacker Tools Apk
- Hacker Tools Hardware
- Hack Tools 2019
- Hacker Search Tools
- Pentest Tools Apk
- Hacking Tools Github
- Pentest Tools Download
- Hacker Security Tools
- Hacking Apps
- Hack Tools Mac
- Wifi Hacker Tools For Windows
- Hacking Tools Download
- Hacking Tools For Kali Linux
- Hack App
- Install Pentest Tools Ubuntu
- Hack Tool Apk No Root
- New Hack Tools
- Termux Hacking Tools 2019
- Hacker Hardware Tools
- Hacker Tools For Mac
- Pentest Tools Review
- Hacker Tools Free Download
- Pentest Tools Website
- Hacker Tools Free
- Easy Hack Tools
- Pentest Tools Port Scanner
- Hacker Tools For Windows
- Hacker Tools Software
- Hacker Tools Hardware
- Github Hacking Tools
- Pentest Reporting Tools
- Pentest Tools Subdomain
- New Hack Tools
- Hacker Tools 2019
- Hack Tools Download
- Pentest Tools Free
- Hacker Tools For Pc
- Pentest Tools Online
- Hacking Tools Pc
- Hack Tools For Mac
- Pentest Tools Alternative
- Nsa Hacker Tools
- What Are Hacking Tools
- Hacker Tools Github
- Hacker Tools Hardware
- Hacking Tools
- Hacker Tools Online
- Best Hacking Tools 2019
- Hacker Security Tools
- Hacker Tools Linux
- Hacker Tools 2019
- Pentest Tools Apk
- Nsa Hack Tools Download
- Hack App
- Hacker Tools Software
No comments:
Post a Comment