What is reconnaissance in ethical hacking?
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
Related posts
- How To Make Hacking Tools
- Hacking Tools Online
- Hack App
- Pentest Box Tools Download
- Hacker Tools 2019
- Hacker Tools List
- Pentest Tools Review
- New Hack Tools
- Pentest Reporting Tools
- Hacker Tools Github
- Hacker Tools 2020
- Pentest Tools Website
- Pentest Reporting Tools
- Hacker Tools For Mac
- Hacking Tools Name
- Hacking Tools Online
- Pentest Tools Url Fuzzer
- Hack Tool Apk
- Hacking Tools And Software
- How To Make Hacking Tools
- Hacking Tools Hardware
- Pentest Tools
- Pentest Reporting Tools
- Hacking Tools Name
- Nsa Hack Tools Download
- Pentest Tools
- Hacker Tool Kit
- Pentest Tools Github
- Hacker Tools Free
- Tools For Hacker
- Pentest Tools Alternative
- Pentest Tools Free
- Hacking Tools For Windows 7
- Hacking Tools Download
- Hack Tools For Games
- Install Pentest Tools Ubuntu
- Hack Tools For Ubuntu
- Hacking Tools Hardware
- Pentest Tools Apk
- Bluetooth Hacking Tools Kali
- Pentest Tools Windows
- Hacker Tools 2020
- Pentest Tools Bluekeep
- Best Pentesting Tools 2018
- Hack Tools
- Physical Pentest Tools
- Beginner Hacker Tools
- Hack App
- Pentest Tools Online
- Hacking Tools For Pc
- Hacking Tools
- Hacker Tools Linux
- Pentest Tools Linux
- Pentest Tools Subdomain
- Pentest Tools Open Source
- Pentest Tools
- Hacker
- Hacking Tools For Windows Free Download
- New Hack Tools
- Pentest Tools Linux
- Hacking Tools 2020
- Hacker Tools For Windows
- Hacker Tools List
- Hack Tools For Windows
- Nsa Hack Tools
- Hacker Tools Mac
- Pentest Tools Nmap
- Pentest Tools Website
- Hacking App
- Pentest Tools Find Subdomains
- Install Pentest Tools Ubuntu
- Hack Tools For Mac
- Hack Tool Apk
- Best Hacking Tools 2019
- Hack Tools For Mac
- Pentest Tools Linux
- Pentest Tools For Android
- Hack Tools 2019
- Hacking Tools Name
- Pentest Tools For Android
- Computer Hacker
- Pentest Tools Tcp Port Scanner
- Hacker Techniques Tools And Incident Handling
- Hack Tools Pc
- Hacks And Tools
- Hacking Tools Online
- Pentest Tools Github

No comments:
Post a Comment