Ethical Hacking Reconnaissanse
Information Gathering and getting to know
Hacking is a set of recycling processes and techniques (footprinting, scanning &
Calculation) is used to translate into a target system
During the reconnaissance, an ethical hacker is possible as a target system.
- Gather initial information
- Determine the network range
- Identify active machines
Discover open ports and access points
Fingerprint the operating system
Uncover services on ports
Map the network
Active Reconnaissance
In this process, you will directly interact with the computer system to gain information.
This information can be relevant and accurate. But there is a risk of getting detected if
you are planning active reconnaissance without permission. If you are detected, then
system admin can take severe action against you and trail your subsequent activities.
Passive Reconnaissance
In this process, you will not be directly connected to a computer system. This process is
used to gather essential information without ever interacting with the target systems.
No comments:
Post a Comment