官术网_书友最值得收藏!

Summary

The first real step in the attack process or kill chain is to conduct reconnaissance to identify the target with the use of OSINT. Passive reconnaissance provides a complete attacker's view of a company. This is a stealthy assessment – the IP address and the activities of the attacker are almost indistinguishable from normal access. Nevertheless, this information can be critical when conducting social engineering attacks or facilitating other attack types. We have now built our own custom script to save time and perform passive reconnaissance using OSINT.

In the next chapter, we will assess the types of reconnaissance that are active and also make use of OSINT results. Although active reconnaissance techniques produce more information, there is an increased risk of detection. Therefore, the emphasis will be on advanced stealth techniques.

主站蜘蛛池模板: 永登县| 内黄县| 县级市| 兴安盟| 哈巴河县| 武清区| 南皮县| 报价| 东明县| 江北区| 广南县| 赤水市| 平谷区| 大姚县| 马公市| 犍为县| 毕节市| 安远县| 陇南市| 资源县| 图木舒克市| 高台县| 海伦市| 池州市| 沿河| 台湾省| 郁南县| 武邑县| 张掖市| 镶黄旗| 泸溪县| 中山市| 长岛县| 丰县| 泰州市| 湾仔区| 惠来县| 外汇| 天水市| 阳信县| 靖远县|