Saturday, January 20, 2024

RECONNAISSANCE IN ETHICAL HACKING

What is reconnaissance in ethical hacking?
This is the primary phase of hacking where the hacker tries to collect as much information as possible about the target.It includes identifying the target ip address range,network,domain,mail server records etc.

They are of two types-
Active Reconnaissance 
Passive Reconnaissance 

1-Active Reconnaissance-It the process from which we directly interact with the computer system to gain information. This information can be relevant and accurate but there is a risk of getting detected if you are planning active reconnaissance without permission.if you are detected then the administration will take the severe action action against you it may be jail!

Passive Reconnaissance-In this process you will not be directly connected to a computer system.This process is used to gather essential information without ever interacting with the target system.

More articles


  1. Hack Tool Apk
  2. New Hacker Tools
  3. Game Hacking
  4. Hack Tool Apk No Root
  5. Pentest Tools Alternative
  6. Hacking Tools Online
  7. Pentest Tools Online
  8. Hacker Techniques Tools And Incident Handling
  9. Pentest Tools Open Source
  10. Hacker Tools List
  11. Hack Tools For Ubuntu
  12. Hacker Tools Windows
  13. Hacker Tools Linux
  14. Pentest Tools Website Vulnerability
  15. Hacker Tools Online
  16. Free Pentest Tools For Windows
  17. Pentest Tools Tcp Port Scanner
  18. Hacker Tools Linux
  19. Hacking App
  20. Ethical Hacker Tools
  21. New Hack Tools
  22. Hack Tools
  23. Hacker Tools Windows
  24. Best Hacking Tools 2020
  25. Hack And Tools
  26. Nsa Hacker Tools
  27. Game Hacking
  28. Pentest Tools For Ubuntu
  29. Hacker Tools 2020
  30. Hacks And Tools
  31. Hacker Tools For Pc
  32. Hack Tools Download
  33. Usb Pentest Tools
  34. Pentest Tools Free
  35. Hacker Search Tools
  36. Usb Pentest Tools
  37. Pentest Tools Open Source
  38. Hacker Tools For Ios
  39. Blackhat Hacker Tools
  40. Hack Tools
  41. Hack Tools For Ubuntu
  42. Pentest Tools Windows
  43. Pentest Tools Port Scanner
  44. Pentest Tools For Android
  45. Hacker
  46. Hacker Tools For Mac
  47. Hacker Tools Software
  48. Hack Tools Mac
  49. Computer Hacker
  50. Pentest Tools Open Source
  51. Pentest Tools Framework
  52. Hacker Tools List
  53. Hack App
  54. Hacking Tools Name
  55. How To Install Pentest Tools In Ubuntu
  56. Hacker Tools Linux
  57. Pentest Box Tools Download
  58. Github Hacking Tools
  59. Blackhat Hacker Tools
  60. Pentest Tools Website Vulnerability
  61. Hack Tool Apk No Root
  62. How To Hack
  63. Ethical Hacker Tools
  64. Pentest Tools Kali Linux
  65. Hacking Tools For Pc
  66. Computer Hacker
  67. Pentest Tools Github
  68. Pentest Tools Kali Linux
  69. Hacking Tools Hardware
  70. Hacker Tools 2020
  71. Hack Tools Download
  72. Hack Tools For Pc
  73. Hack Tools
  74. Hacking Tools Software
  75. Pentest Tools Bluekeep
  76. Pentest Tools Review
  77. Pentest Tools Nmap
  78. Hack Tools
  79. Hacker Tools Github
  80. Hacking Tools Mac
  81. Pentest Tools Framework
  82. Hack Tools Github
  83. What Are Hacking Tools
  84. Pentest Tools Download
  85. Hack Tools Github
  86. Pentest Tools For Ubuntu
  87. Easy Hack Tools
  88. Hack Tools For Ubuntu
  89. New Hacker Tools
  90. Hack Tools
  91. Hacking Tools And Software
  92. Hack Tools For Mac
  93. Pentest Tools Website Vulnerability
  94. Hack Tools Mac
  95. What Are Hacking Tools
  96. Hack Tool Apk
  97. Hacker Tools
  98. Termux Hacking Tools 2019
  99. Pentest Tools Framework
  100. Hacker Security Tools
  101. Hacking App
  102. Hacking Tools Software
  103. New Hack Tools
  104. Top Pentest Tools
  105. Hacker
  106. Pentest Tools Subdomain
  107. Pentest Tools Url Fuzzer
  108. Hack Website Online Tool
  109. Growth Hacker Tools
  110. Hacker Tools For Ios
  111. Kik Hack Tools
  112. Hacking Tools For Games
  113. Game Hacking
  114. Easy Hack Tools

No comments:

Bloomberg - UTV

Must Watch...Ad may come initially.. wait for video.Also keep volume on

Disclaimer



This Document is subject to changes without prior notice and is intended only for the person or entity to which it is addressed to and may contain confidential and/or privileged material and is not for any type of circulation. Any review, retransmission, or any other use is prohibited. Kindly note that this document does not constitute an offer or solicitation for the purchase or sale of any financial instrument or as an official confirmation of any transaction.


The information contained herein is from publicly available data or other sources believed to be reliable. While I would endeavour to update the information herein on reasonable basis, I am under no obligation to update or keep the information current. Also, there may be regulatory, compliance, or other reasons that may prevent me from doing so. I do not represent that information contained herein is accurate or complete and it should not be relied upon as such. This document is prepared for assistance only and is not intended to be and must not alone betaken as the basis for an investment decision. The user assumes the entire risk of any use made of this information. Each recipient of this document should make such investigations as it deems necessary to arrive at an independent evaluation of an investment in the securities of companies referred to in this document (including the merits and risks involved), and should consult its own advisors to determine the merits and risks of such an investment. The investment discussed or views expressed may not be suitable for all investors. I do not undertake to advise you as to any change of my views. I may have issued other reports that are inconsistent with and reach different conclusion from the information presented in this report. This report is not directed or intended for distribution to, or use by, any person or entity who is a citizen or resident of or located in any locality, state, country or other jurisdiction, where such distribution, publication, availability or use would be contrary to law, regulation or which would subject me to any registration or licensing requirement within such jurisdiction. The securities described herein may or may not be eligible for sale in all jurisdictions or to certain category of investors. Persons in whose possession this document may come are required to inform themselves of and to observe such restriction. I may have used the information set forth herein before publication and may have positions in, may from time to time purchase or sell or may be materially interested in any of the securities mentioned or related securities. I may from time to time solicit from, or perform investment banking, or other services for, any company mentioned herein. Without limiting any of the foregoing, in no event shall I or any third party involved in, or related to, computing or compiling the information have any liability for any damages of any kind.