官术网_书友最值得收藏!

Active Reconnaissance of External and Internal Networks

The main goal of the active reconnaissance phase is to collect and weaponize the information about the target as much as possible in order to facilitate the exploitation phase of the kill chain methodology.

We have seen how to perform passive reconnaissance using OSINT, which is almost undetectable, and can yield a significant amount of information about the target organization and its users.

Active reconnaissance builds on the results of OSINT and passive reconnaissance, and emphasizes more focused probes to identify the path to the target and the exposed attack surface of the target. In general, complex systems have a greater attack surface, and each surface may be exploited and then leveraged to support additional attacks.

Although active reconnaissance produces more useful information, interactions with the target system may be logged, triggering alarms by protective devices, such as firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems (IPS).

As the usefulness of the data to the attacker increases, so does the risk of detection; this is shown in the following diagram:

To improve the effectiveness of active reconnaissance in providing detailed information, our focus will be on using stealthy, or difficult to detect, techniques.

In this chapter, you will learn about the following topics:

  • Stealth scanning strategies
  • External and internal infrastructure, host discovery, and enumeration
  • The comprehensive reconnaissance of applications, especially using recon-ng
  • The enumeration of internal hosts using DHCP
  • Useful Microsoft Windows commands for penetration testing
  • Taking advantage of default configurations
主站蜘蛛池模板: 陆丰市| 齐齐哈尔市| 武清区| 陆丰市| 凤阳县| 喜德县| 日喀则市| 苏尼特右旗| 虞城县| 通江县| 重庆市| 贵德县| 曲麻莱县| 资阳市| 蒙阴县| 内丘县| 通州市| 利津县| 五大连池市| 罗源县| 霍州市| 子长县| 云林县| 安新县| 城步| 黔西县| 剑川县| 太和县| 浮梁县| 临西县| 安徽省| 新野县| 镇坪县| 阿克苏市| 龙陵县| 嘉禾县| 冀州市| 鱼台县| 大关县| 南皮县| 太康县|