What is reconnaissance in ethical hacking?
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.
They are of two types-
Active Reconnaissance
Passive Reconnaissance
1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!
Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.
Related links
- Hacking Tools
- Hack Tools For Games
- Pentest Tools Download
- Pentest Tools Subdomain
- Hack Website Online Tool
- Hacking Tools Hardware
- Hackrf Tools
- Hacker Tools For Ios
- World No 1 Hacker Software
- Pentest Tools Review
- Hacking Tools For Games
- Hacking Tools Online
- Hack And Tools
- Pentest Tools Github
- Hacker Tools List
- How To Install Pentest Tools In Ubuntu
- Hacking Tools Mac
- Hacker Tools Linux
- Best Hacking Tools 2019
- Hacking Tools Usb
- Hacking Tools For Windows Free Download
- Pentest Box Tools Download
- Hackrf Tools
- Pentest Tools Website Vulnerability
- Hack Tools Github
- Hacker Tools Free
- Hackrf Tools
- Hackers Toolbox
- Hacking Tools Software
- What Is Hacking Tools
- Hacker Tools For Windows
- Hacking Tools For Games
- Hacking Tools Download
- Hacker Tools For Pc
- Tools Used For Hacking
- Hacking Tools Hardware
- Hack Tool Apk No Root
- Hacker Techniques Tools And Incident Handling
- Hack Tools For Ubuntu
- Best Hacking Tools 2020
- Pentest Tools Subdomain
- Beginner Hacker Tools
- Hacking App
- Pentest Tools Download
- Pentest Tools Linux
- Hacking Tools Github
- Hacker Tools Software
- Hacking Tools For Windows
- Android Hack Tools Github
- Hacking Tools Software
- Install Pentest Tools Ubuntu
- Pentest Tools Alternative
- Nsa Hack Tools Download
- Hacking Tools For Windows Free Download
- Pentest Tools Android
- Hacker Tools Mac
- Pentest Tools For Mac
- Hacking Tools And Software
- Pentest Tools For Windows
- Hack App
- Hack Tools For Games
- Beginner Hacker Tools
- Pentest Box Tools Download
- Hacker Search Tools
- Game Hacking
- Hacking App
- Top Pentest Tools
- Pentest Tools Windows
- What Are Hacking Tools
- Easy Hack Tools
- Free Pentest Tools For Windows
- Hacking Tools Pc
- What Are Hacking Tools
- Hacker Tools For Pc
- Pentest Tools List
- Pentest Tools Kali Linux
- Bluetooth Hacking Tools Kali
- Hack Rom Tools
- Pentest Tools Online
- Tools 4 Hack
- Hacking Tools 2019
- New Hacker Tools
- Pentest Tools Find Subdomains
- Best Hacking Tools 2019
- Hacking Tools Pc
- Pentest Tools Website
- Pentest Tools
- Pentest Tools Find Subdomains
- Android Hack Tools Github
- Hack Tool Apk
- Blackhat Hacker Tools
- Pentest Tools Subdomain
- Computer Hacker