官术网_书友最值得收藏!

Reconnaissance

The previous chapter gave you an overall view of all the stages of the cyber-attack life cycle. This chapter will go into the first phase of the life cycle in depth—reconnaissance. Reconnaissance is one of the most important stages of a threat life cycle, where attackers search for vulnerabilities that they can use to attack targets. An attacker will be interested in locating and gathering data, and identifying any loopholes in a target's network, its users, or its computing systems. Reconnaissance is done both passively and actively, borrowing tactics that have been used by the military. It can be compared to the sending of spies into an enemy's territory to gather data about where and when to strike. When reconnaissance is done in the right way, the target should not be able to know that it is being done. This critical attack life cycle phase can be actualized in a number of ways, which are broadly classified as external and internal reconnaissance.

This chapter is going to discuss the following topics:

  • External reconnaissance:
    • Dumpster diving
    • The use of social media to obtain information about the target
    • Social engineering
  • Tools used to perform internal reconnaissance
主站蜘蛛池模板: 上栗县| 格尔木市| 温州市| 伊吾县| 衡水市| 宁德市| 韶关市| 营山县| 阳泉市| 福州市| 曲阜市| 三亚市| 雅安市| 南漳县| 慈利县| 赤壁市| 望奎县| 吐鲁番市| 华亭县| 比如县| 洛宁县| 石楼县| 开鲁县| 棋牌| 丘北县| 平潭县| 大埔区| 江阴市| 连江县| 班戈县| 泰州市| 富源县| 常熟市| 梧州市| 博客| 额尔古纳市| 三都| 于都县| 安康市| 正蓝旗| 溧阳市|