What is reconnaissance in ethical hacking?
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
Related word
- Tools For Hacker
- Hacker Tools Hardware
- Hack Tools Github
- Hacking Tools For Games
- Hacking Tools For Mac
- Pentest Tools Alternative
- Hack Tools For Ubuntu
- Pentest Tools Alternative
- Hack Tools Github
- Hacking Tools Windows
- Hackers Toolbox
- Pentest Tools Github
- Hacker Tools Hardware
- Nsa Hack Tools Download
- Hacker Tools 2020
- Wifi Hacker Tools For Windows
- Hacker Security Tools
- Hacker Hardware Tools
- Hacking App
- Hacker Tools Free Download
- Hacker Tools List
- Pentest Tools Review
- Hack Tools Mac
- Hack Tools Download
- What Are Hacking Tools
- Hacker Tools 2019
- Pentest Tools For Ubuntu
- Pentest Tools Website
- Hacking Tools
- Nsa Hack Tools Download
- Pentest Tools Bluekeep
- Hackrf Tools
- Hack Tools Pc
- Pentest Tools Nmap
- New Hack Tools
- Hacking Tools Download
- Hacker Tools Apk Download
- Hacking Tools Pc
- World No 1 Hacker Software
- How To Make Hacking Tools
- Hacker Hardware Tools
- Pentest Tools Linux
- Beginner Hacker Tools
- Hacking Tools 2019
- How To Make Hacking Tools
- Hacker Tools Windows
- Best Pentesting Tools 2018
- Bluetooth Hacking Tools Kali
- Hacker Tool Kit
- Hacker Tools Software
- Hack Tools For Mac
- Hacker Tools Github
- Hacker Tools For Pc
- Computer Hacker
- Hack Tools
- Hacking Tools Windows
- Hack Tools For Games
- Pentest Automation Tools
- Pentest Tools Linux
- Pentest Tools Nmap
- Hacker
- Kik Hack Tools
- Hack App
- Tools For Hacker
- Pentest Tools Android
- Computer Hacker
- Pentest Tools Alternative
- Hacker Tools Github
- Pentest Recon Tools
- Pentest Reporting Tools
- Pentest Tools List
- What Is Hacking Tools
- Top Pentest Tools
- Hacking Tools 2019
- Hacker Security Tools
- Hacker Tools For Mac
- Hacker Hardware Tools
- Hack Tool Apk No Root
- Pentest Tools
- Hacking Tools Windows 10
- Hacking Tools Windows
- Hackrf Tools
- Wifi Hacker Tools For Windows
- Hacker Tools Free Download
- Pentest Tools For Mac
- What Is Hacking Tools
- Hacking Tools For Pc
Nenhum comentário:
Postar um comentário