Ethical Hacking Programming, Blogging, Hosting, All Computer Software, PC Software Download, JAVA in hindi, HTML, PHP, C, C++, Free Learning, Software's Download, Technical Videos, Technical Tricks and Tips, How Make Money

Ethical Hacking Reconnaissanse

 Ethical Hacking Reconnaissanse

Information Gathering and getting to know
Hacking is a set of recycling processes and techniques (footprinting, scanning &
Calculation) is used to translate into a target system

During the reconnaissance, an ethical hacker is possible as a target system.

  • Gather initial information
  • Determine the network range
  • Identify active machines

  • Discover open ports and access points

  • Fingerprint the operating system

  • Uncover services on ports 

  • Map the network


We will discuss in detail all these steps in the subsequent chapters of this tutorial. Reconnaissance  takes  place  in  two  parts:  Active  Reconnaissance  and  Passive Reconnaissance./The thief is in two parts: active mill and inactive grip.

Active Reconnaissance
In this process, you will directly interact with the computer system to gain information. 
This information can be relevant and accurate. But there is a risk of getting detected if 
you are planning active reconnaissance without permission. If you are detected, then 
system admin can take severe action against you and trail your subsequent activities.

Passive Reconnaissance
In this process, you will not be directly connected to a computer system. This process is 


used to gather essential information without ever interacting with the target systems.
Share:

Related Posts:

No comments:

Post a Comment

Follow On YouTube