- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 197字
- 2021-06-30 19:15:57
Reconnaissance
The previous chapter gave you an overall view of all the stages of the cyber-attack life cycle. This chapter will go into the first phase of the life cycle in depth—reconnaissance. Reconnaissance is one of the most important stages of a threat life cycle, where attackers search for vulnerabilities that they can use to attack targets. An attacker will be interested in locating and gathering data, and identifying any loopholes in a target's network, its users, or its computing systems. Reconnaissance is done both passively and actively, borrowing tactics that have been used by the military. It can be compared to the sending of spies into an enemy's territory to gather data about where and when to strike. When reconnaissance is done in the right way, the target should not be able to know that it is being done. This critical attack life cycle phase can be actualized in a number of ways, which are broadly classified as external and internal reconnaissance.
This chapter is going to discuss the following topics:
- External reconnaissance:
- Dumpster diving
- The use of social media to obtain information about the target
- Social engineering
- Tools used to perform internal reconnaissance
- Windows Vista基礎與應用精品教程
- Windows Server 2012 Hyper-V:Deploying the Hyper-V Enterprise Server Virtualization Platform
- 大學計算機應用基礎實踐教程(Windows 7+Office 2013)
- Kali Linux滲透測試全流程詳解
- Hands-On DevOps with Vagrant
- Kubernetes從入門到實踐
- 數(shù)據(jù)中心系統(tǒng)工程及應用
- 網(wǎng)絡操作系統(tǒng)管理與應用(第三版)
- Linux服務器配置與管理
- OpenSolaris設備驅(qū)動原理與開發(fā)
- Troubleshooting Docker
- Windows 7實戰(zhàn)從入門到精通(超值版)
- Advanced Infrastructure Penetration Testing
- Ubuntu Linux操作系統(tǒng)實用教程
- Linux內(nèi)核API完全參考手冊(第2版)