官术网_书友最值得收藏!

Summary

The first real step in the attack process or kill chain is to conduct reconnaissance to identify the target with the use of OSINT. Passive reconnaissance provides a complete attacker's view of a company. This is a stealthy assessment – the IP address and the activities of the attacker are almost indistinguishable from normal access. Nevertheless, this information can be critical when conducting social engineering attacks or facilitating other attack types. We have now built our own custom script to save time and perform passive reconnaissance using OSINT.

In the next chapter, we will assess the types of reconnaissance that are active and also make use of OSINT results. Although active reconnaissance techniques produce more information, there is an increased risk of detection. Therefore, the emphasis will be on advanced stealth techniques.

主站蜘蛛池模板: 大同市| 信宜市| 广灵县| 铁力市| 九龙县| 南召县| 新龙县| 焦作市| 株洲市| 广州市| 乐山市| 古蔺县| 九寨沟县| 临夏县| 湾仔区| 孝义市| 凤台县| 兰溪市| 尉犁县| 岫岩| 砚山县| 水城县| 景宁| 镇雄县| 富蕴县| 三穗县| 连平县| 罗江县| 平度市| 通州区| 个旧市| 永春县| 元阳县| 桓台县| 板桥市| 望城县| 华阴市| 眉山市| 鸡东县| 峨眉山市| 娄烦县|