What is reconnaissance in ethical hacking?
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
Related articles
- Github Hacking Tools
- How To Install Pentest Tools In Ubuntu
- Pentest Tools Windows
- Nsa Hack Tools Download
- Github Hacking Tools
- Hacking Tools Kit
- Kik Hack Tools
- How To Install Pentest Tools In Ubuntu
- Nsa Hack Tools Download
- Hack Tools Github
- Hacking Tools Mac
- Pentest Tools Windows
- Hacking Tools Pc
- Hacking Tools Pc
- Pentest Tools Website Vulnerability
- Hacking Tools Github
- What Are Hacking Tools
- Hacker Search Tools
- New Hacker Tools
- Hacker Search Tools
- Hacking Tools Name
- Best Hacking Tools 2020
- Growth Hacker Tools
- Pentest Tools Subdomain
- Hacking Tools Windows 10
- Hacking Tools
- Pentest Box Tools Download
- Pentest Tools Github
- Easy Hack Tools
- Pentest Tools Apk
- Hack Tools Github
- Hacker Tools List
- Pentest Tools Nmap
- Pentest Tools Windows
- Pentest Tools Subdomain
- Blackhat Hacker Tools
- Pentest Tools Alternative
- Pentest Tools Website
- Hacking Tools Name
- Hacker Tools For Ios
- Hacking Tools Download
- Hacker Tools List
- Computer Hacker
- Hack Tools Online
- Hacking Tools 2019
- Hack Tools
- Hacking Tools For Kali Linux
- Pentest Tools Kali Linux
- Hacker Tools For Mac
- Pentest Tools List
- Hacker Techniques Tools And Incident Handling
- Pentest Tools Find Subdomains
- Hacker Tools For Pc
- Android Hack Tools Github
- Pentest Box Tools Download
- Pentest Tools
- What Is Hacking Tools
- Usb Pentest Tools
- Pentest Tools Bluekeep
- Hacker
- Hack Tools Mac
- Pentest Tools Github
- Hacking Tools For Mac
- New Hack Tools
- Hacker Tools Apk
- Hacker Tools Software
- Hack App
- Pentest Tools Windows
- Underground Hacker Sites
- Pentest Tools Url Fuzzer
- Hacking Tools Pc
- Termux Hacking Tools 2019
- Hacker Tools Github
- Pentest Tools Kali Linux
- Pentest Recon Tools
- Hack Tools Online
- Pentest Tools Framework
- Kik Hack Tools