What is reconnaissance in ethical hacking?
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
Related word
- Hack Tools
- Pentest Tools Nmap
- Pentest Tools Github
- Hacking Tools Usb
- Hacker Tools Windows
- Pentest Tools Url Fuzzer
- Pentest Reporting Tools
- Pentest Tools Url Fuzzer
- Hacking Tools Usb
- Hacking Tools For Windows Free Download
- Hack Tools For Mac
- Hack Tools
- Hacking Tools Github
- How To Make Hacking Tools
- Usb Pentest Tools
- Free Pentest Tools For Windows
- Hacking Tools Kit
- Pentest Tools Find Subdomains
- Hacking Tools 2019
- Blackhat Hacker Tools
- Hack Tools Download
- Hacker Tools Software
- Black Hat Hacker Tools
- Hacking Tools Name
- Bluetooth Hacking Tools Kali
- Nsa Hacker Tools
- Underground Hacker Sites
- Hacker Tools Github
- Pentest Tools Bluekeep
- Hack Tools Online
- Pentest Tools Online
- Pentest Recon Tools
- Hacking Tools Free Download
- Hack Tool Apk
- Hacks And Tools
- Computer Hacker
- Hacker Search Tools
- Pentest Tools Tcp Port Scanner
- What Are Hacking Tools
- Top Pentest Tools
- Pentest Automation Tools
- Hacking App
- Pentest Tools Url Fuzzer
- Hacking Tools Pc
- Nsa Hack Tools Download
- Pentest Tools For Mac
- Nsa Hack Tools Download
- Install Pentest Tools Ubuntu
- Hack Rom Tools
- Hacking Tools For Games
- Hacking Tools For Kali Linux
- Hack Apps
- Hack Tools 2019
- Hack Tools Mac
- Hacker Tools For Windows
- Hack App
- Hacker Tools Mac
- Hacker Security Tools
- Hacking App
- Hacker Tools 2019
- Pentest Tools Linux
- Pentest Tools Nmap
- Hacking Tools For Windows 7
- Pentest Tools Website Vulnerability
- Hackrf Tools
- Hacker Tools Mac
- Pentest Tools For Mac
- Termux Hacking Tools 2019
- Pentest Box Tools Download
- New Hack Tools
- Hacking Tools Kit
- Pentest Tools Download
- Hack Tools
- Android Hack Tools Github
- Hack Tools For Ubuntu
- Hacking Tools Mac
- Pentest Tools Framework
- Hacker Tools Github
- Pentest Recon Tools
- Hacker Tool Kit
- Install Pentest Tools Ubuntu
- Hack Apps
- Hack Tools Download
- Pentest Tools List
- What Is Hacking Tools
- Hack Website Online Tool
- Hacking Tools Usb
- Hack App
- Hacking Tools Kit
- Pentest Box Tools Download
- Best Hacking Tools 2019
- Hacking Tools Software
- Hacker Tools For Windows
- Hacker Search Tools
- Pentest Tools Find Subdomains
- Hacker Tools Hardware
- Hacking Tools Free Download
0 comments:
Post a Comment