- Mastering Kali Linux for Advanced Penetration Testing
- Robert W. Beggs
- 229字
- 2021-07-16 11:33:20
Chapter 2. Identifying the Target – Passive Reconnaissance
Reconnaissance is the first step of the kill chain when conducting a penetration test or an attack against a network or server target. An attacker will typically dedicate up to seventy-five percent of the overall work effort for a penetration test to reconnaissance, as it is this phase that allows the target to be defined, mapped, and explored for the vulnerabilities that will eventually lead to exploitation.
There are two types of reconnaissance: passive reconnaissance, and active reconnaissance.
Generally, passive reconnaissance is concerned with analyzing information that is openly available, usually from the target itself or public sources online. On accessing this information, the tester or attacker does not interact with the target in an unusual manner—requests and activities will not be logged, or will not be traced directly to the tester. Therefore, passive reconnaissance is conducted first to minimize the direct contact that may signal an impending attack or to identify the attacker.
In this chapter, you will learn the principles and practices of passive reconnaissance, which include the following:
- Basic principles of reconnaissance
- Open-source intelligence (OSINT)
- DNS reconnaissance and route mapping, including issues with IPv4 and IPv6
- Obtaining user information
- Profiling users for password lists
Active reconnaissance, which involves direct interaction with the target, will be covered in Chapter 3, Active Reconnaissance and Vulnerability Scanning.
- Android應用安全實戰:Frida協議分析
- Kali Linux CTF Blueprints
- 為你護航:網絡空間安全科普讀本(第2版)
- 大型互聯網企業安全架構
- 計算機使用安全與防護
- Enterprise Cloud Security and Governance
- Python Penetration Testing Cookbook
- 網絡運維親歷記 (網絡運維紀實文學)
- 計算機網絡安全基礎(第5版)
- API安全技術與實戰
- VMware vCloud Security
- Mastering Malware Analysis
- 云計算安全:關鍵技術、原理及應用
- 黑客攻防從入門到精通:實戰篇(第2版)
- ATT&CK視角下的紅藍對抗實戰指南