Information Gathering and getting to know the target systems is
the first process in ethical hacking. Reconnaissance is a set of processes and
techniques (Footprinting, Scanning & Enumeration) used to covertly discover
and collect information about a target system.
During reconnaissance, an ethical hacker attempts to gather as
much information about a target system as possible, following the seven steps
listed below −
- Gather initial
information
- Determine the
network range
- Identify active
machines
- Discover open
ports and access points
- Fingerprint the
operating system
- Uncover
services on ports
- Map the network
We will discuss in detail all these steps in the subsequent
chapters of this tutorial. Reconnaissance takes place in two parts − Active
Reconnaissanceand Passive Reconnaissance.
Active Reconnaissance
In this process, you will directly interact with the computer
system to gain information. This information can be relevant and accurate. But
there is a risk of getting detected if you are planning active reconnaissance
without permission. If you are detected, then system admin can take severe
action against you and trail your subsequent activities.
Passive Reconnaissance
In this process, you will not be directly connected to a computer
system. This process is used to gather essential information without ever interacting
with the target systems.
No comments:
Post a Comment