官术网_书友最值得收藏!

Basic principles of reconnaissance

Reconnaissance, or recon, is the first step of the kill chain when conducting a penetration test or attack against a data target. This is conducted before the actual test or attack of a target network. The findings will point to where additional reconnaissance may be required, or the vulnerabilities to attack during the exploitation phase.

Reconnaissance activities are segmented on a gradient of interactivity with the target network or device.

Passive reconnaissance does not involve any malicious direct interaction with the target network. The attacker's source IP address and activities are not logged (for example, a Google search for the target's email addresses). It is difficult, if not impossible, for the target to differentiate passive reconnaissance from normal business activities. Here's some more information:

  • Passive reconnaissance is further divided into the direct and indirect categories. Direct passive reconnaissance involves the normal interactions that occur when an attacker interacts with the target in an expected manner. For example, an attacker will log on to the corporate website, view various pages, and download documents for further study. These interactions are expected user activities, and are rarely detected as a prelude to an attack on the target. Indirect passive reconnaissance entails absolutely no interaction with the target organisation
  • Active reconnaissance involves direct queries or other interactions (for example, port scanning of the target network) that can trigger system alarms or allow the target to capture the attacker's IP address and activities. This information could be used to identify and arrest an attacker, or during legal proceedings. Because active reconnaissance requires additional techniques for the tester to remain undetected, it will be covered in Chapter 3, Active Reconnaissance of External and Internal Networks.

Penetration testers or attackers generally follow a process of structured information gathering, moving from a broad scope (the business and regulatory environments) to a very specific scope (user account data).

To be effective, testers should know exactly what they are looking for and how the data will be used before collection starts. Using passive reconnaissance and limiting the amount of data collected minimizes the risks of being detected by the target.

主站蜘蛛池模板: 襄垣县| 延安市| 宁城县| 昂仁县| 新营市| 青冈县| 仙桃市| 云安县| 获嘉县| 九龙坡区| 茶陵县| 改则县| 闽侯县| 龙南县| 黄大仙区| 布尔津县| 清原| 汕头市| 拜泉县| 鹿泉市| 福泉市| 射洪县| 东辽县| 宁南县| 烟台市| 米脂县| 翼城县| 尉氏县| 裕民县| 城固县| 磐安县| 冕宁县| 宁河县| 沐川县| 琼中| 苏尼特左旗| 霞浦县| 清涧县| 泰来县| 阜南县| 榕江县|