- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 284字
- 2021-06-30 19:16:00
Internal reconnaissance
Unlike external reconnaissance attacks, internal reconnaissance is done on-site. This means that the attacks are carried out within an organization's network, systems, and premises. Mostly, this process is aided by software tools. An attacker interacts with the actual target systems in order to find out information about its vulnerabilities. This is the main difference between internal and external reconnaissance techniques.
External reconnaissance is done without interacting with the system, but by instead finding entry points through humans that work in the organization. That is why most external reconnaissance attempts involve hackers trying to reach users through social media, emails, and phone calls. Internal reconnaissance is still a passive attack since the aim is to find information that can be used in future for an even more serious attack.
The main target of internal reconnaissance is the internal network of an organization, where hackers are sure to find the data servers and the IP addresses of hosts they can infect. It is known that data in a network can be read by anyone in the same network with the right tools and skill set. Attackers use networks to discover and analyze potential targets to attack in the future. Internal reconnaissance is used to determine the security mechanisms in place that ward off hacking attempts. There are many cyber security tools that have been made to mitigate software used to perform reconnaissance attacks. However, most organizations never install enough security tools and hackers keep on finding ways to hack through the already-installed ones. There are a number of tools that hackers have tested and have found to be effective at studying their targets' networks. Most of them can be classified as sniffing tools.
- Kubernetes修煉手冊
- 嵌入式Linux開發技術
- Linux運維實戰:CentOS7.6操作系統從入門到精通
- 蘋果電腦玩全攻略 OS X 10.8 Mountain Lion
- 無蘋果不生活 OS X Mountain Lion隨身寶典
- Linux網絡操作系統與實訓(第三版)
- SharePoint 2013 應用開發實戰
- 深入理解eBPF與可觀測性
- RESS Essentials
- Instant Optimizing Embedded Systems using Busybox
- 嵌入式系統原理及開發
- STM32庫開發實戰指南:基于STM32F4
- 深入淺出Node.js
- 鴻蒙操作系統設計原理與架構
- OpenHarmony開發與實踐:基于紅莓RK2206開發板