官术网_书友最值得收藏!

Reconnaissance

In this first phase, before taking any action, the attacker must be prepared by carrying out an information-gathering exercise on the target. The attacker collects, from many sources, every piece of publicly available sensitive information, such as target clients, employees, and network information. At the end of this phase, the hacker will have a clear view of the network (domain name, IP ranges, TCP/UDP services, and authentication mechanisms), the system (user/group names, system banners, and system architecture), and organizational information (employee details, press released, and location). There are two types of reconnaissance or footprinting.

主站蜘蛛池模板: 屏边| 盖州市| 松江区| 浠水县| 丰原市| 阿拉善右旗| 永兴县| 增城市| 尼玛县| 鹤庆县| 京山县| 亳州市| 高邑县| 迁西县| 元阳县| 桐柏县| 永修县| 霸州市| 平潭县| 福建省| 迁安市| 宜州市| 武夷山市| 方山县| 平江县| 天台县| 修文县| 海淀区| 项城市| 凤翔县| 太原市| 莆田市| 阳新县| 灵璧县| 合江县| 伊吾县| 绥芬河市| 十堰市| 余姚市| 雷州市| 许昌市|