- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 197字
- 2021-06-30 19:15:57
Reconnaissance
The previous chapter gave you an overall view of all the stages of the cyber-attack life cycle. This chapter will go into the first phase of the life cycle in depth—reconnaissance. Reconnaissance is one of the most important stages of a threat life cycle, where attackers search for vulnerabilities that they can use to attack targets. An attacker will be interested in locating and gathering data, and identifying any loopholes in a target's network, its users, or its computing systems. Reconnaissance is done both passively and actively, borrowing tactics that have been used by the military. It can be compared to the sending of spies into an enemy's territory to gather data about where and when to strike. When reconnaissance is done in the right way, the target should not be able to know that it is being done. This critical attack life cycle phase can be actualized in a number of ways, which are broadly classified as external and internal reconnaissance.
This chapter is going to discuss the following topics:
- External reconnaissance:
- Dumpster diving
- The use of social media to obtain information about the target
- Social engineering
- Tools used to perform internal reconnaissance
- Arch Linux Environment Setup How-to
- WordPress Mobile Web Development:Beginner's Guide
- Haskell Financial Data Modeling and Predictive Analytics
- 嵌入式Linux系統開發:基于Yocto Project
- Linux集群和自動化運維
- Python基礎教程(第3版)
- 突破平面3ds Max動畫設計與制作
- Mastering Reactive JavaScript
- AutoCAD 2014中文版從入門到精通
- Windows 7應用入門與技巧
- Introduction to R for Quantitative Finance
- 分布式系統設計實踐
- Zabbix監控系統之深度解析和實踐
- Learn Quantum Computing with Python and IBM Quantum Experience
- Java EE 8 High Performance