Email Login| Link Exchange | Cyber News | Phishing Attack | SQL Injection | SEO | DOS Attack | Hacking Tools | |Hacking Tricks | Penetration Testing | Trojans & Keyloggers |Hacking Videos | General Discussion | Website Hacking | Session Hijacking | Social Engineering | Anonymous Surfing | Recover Passwords | Bypass Firewall | Hacking Books | Network Sniffers | Password Cracking | Enumerating & Fingerprinting | Movies & Songs

Share This Post With Your Friends

Tuesday, March 31, 2009

Hacking Phase 1 - Reconnaissance

  • Reconnaissance refers to the preparatory phase where an attacker seeks to gather as much information as possible about a target of evaluation prior to launching an attack. It involves network scanning either external or internal without authorization

  • Business Risk - To see if someone is watching and responding. Could be future point of return when noted for ease of entry for an attack when more is known on a broad scale about the target.

  • Passive reconnaissance involves monitoring network data for patterns and clues.

    • Examples include sniffing, information gathering etc.

  • Active reconnaissance involves probing the network to detect

    • accessible hosts

    • open ports

    • location of routers

    • details of operating systems and services

0 Visitor Reactions & Comments:

Newer Post Older Post Home