- Mastering Kali Linux for Advanced Penetration Testing(Second Edition)
- Vijay Kumar Velu
- 133字
- 2021-07-02 21:04:18
Summary
The first real step in the attack process or kill chain is to conduct reconnaissance to identify the target with the use of OSINT. Passive reconnaissance provides a complete attacker's view of a company. This is a stealthy assessment – the IP address and the activities of the attacker are almost indistinguishable from normal access. Nevertheless, this information can be critical when conducting social engineering attacks or facilitating other attack types. We have now built our own custom script to save time and perform passive reconnaissance using OSINT.
In the next chapter, we will assess the types of reconnaissance that are active and also make use of OSINT results. Although active reconnaissance techniques produce more information, there is an increased risk of detection. Therefore, the emphasis will be on advanced stealth techniques.
- Practical Data Analysis Cookbook
- Azure IoT Development Cookbook
- INSTANT CakePHP Starter
- 零基礎(chǔ)學(xué)MQL:基于EA的自動化交易編程
- Java設(shè)計(jì)模式及實(shí)踐
- SAP BusinessObjects Dashboards 4.1 Cookbook
- Scala for Machine Learning(Second Edition)
- R數(shù)據(jù)科學(xué)實(shí)戰(zhàn):工具詳解與案例分析
- 后臺開發(fā):核心技術(shù)與應(yīng)用實(shí)踐
- Moodle 3 Administration(Third Edition)
- Android應(yīng)用程序設(shè)計(jì)
- Spring Web Services 2 Cookbook
- Instant AppFog
- Learning RSLogix 5000 Programming
- Cocos2D Game Development Essentials