What is reconnaissance in ethical hacking?
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
 
They are of two types-
Active Reconnaissance
Passive Reconnaissance
 
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
 
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
  
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
Related news
- New Hacker Tools
- Pentest Tools Website Vulnerability
- What Are Hacking Tools
- Hacking Tools 2020
- Physical Pentest Tools
- Beginner Hacker Tools
- Tools Used For Hacking
- Hacker
- Hack Tool Apk
- Github Hacking Tools
- Computer Hacker
- Hacker Tools 2020
- Hacking Tools For Beginners
- Hacker Tools Linux
- Black Hat Hacker Tools
- Hacking Tools For Pc
- Pentest Tools Tcp Port Scanner
- How To Make Hacking Tools
- Hacking Tools For Windows Free Download
- Pentest Tools For Android
- Nsa Hack Tools
- Nsa Hacker Tools
- Hacker Tools Hardware
- Hack Tools For Ubuntu
- Best Hacking Tools 2020
- Pentest Tools Nmap
- Hacking Tools Download
- Nsa Hack Tools Download
- Hacking Tools For Pc
- Growth Hacker Tools
- Pentest Tools
- Hack Tools Github
- Hacking Tools Hardware
- Pentest Tools Website
- World No 1 Hacker Software
- Pentest Reporting Tools
- Pentest Tools Kali Linux
- Hacker Tool Kit
- Growth Hacker Tools
- Underground Hacker Sites
- Hack Tools Github
- Pentest Tools Android
- Pentest Tools Nmap
- Hacker Tools For Windows
- Nsa Hack Tools
- How To Install Pentest Tools In Ubuntu
- Hacking Tools Mac
- Computer Hacker
- Hacker Tools For Pc
- What Is Hacking Tools
- Pentest Tools Github
- Pentest Tools For Mac
- Hack Tool Apk No Root
- Hacking Tools And Software
- Pentest Tools For Ubuntu
- Hacking Tools 2019
- Pentest Recon Tools
- Hack Tool Apk No Root
- Hacker Tools Hardware
- Hacking Tools Windows 10
- Pentest Tools Bluekeep
- Pentest Tools Framework
- Hack Tools Download
- Bluetooth Hacking Tools Kali
- Pentest Tools Nmap
- Nsa Hacker Tools
- Hack Tools Github
- Nsa Hack Tools Download
- Hacking Tools Github
- Hacker Tools For Mac
- Pentest Tools For Mac
- Android Hack Tools Github
- Hacking Tools For Beginners
- Hacking Tools Kit
- Hacking Apps
- Game Hacking
- Pentest Tools Tcp Port Scanner
- Black Hat Hacker Tools
- Tools 4 Hack
- Hacking Tools Download
- Pentest Tools Android
- Nsa Hacker Tools
- Kik Hack Tools
- Pentest Tools Github
- How To Hack
- Pentest Tools Url Fuzzer
- Hack Tools For Mac
- Tools For Hacker
- World No 1 Hacker Software
- Hacker Tools Apk
- Pentest Tools Kali Linux
- Install Pentest Tools Ubuntu

 
 
No hay comentarios:
Publicar un comentario