- Mastering Kali Linux for Advanced Penetration Testing
- Robert W. Beggs
- 229字
- 2021-07-16 11:33:20
Chapter 2. Identifying the Target – Passive Reconnaissance
Reconnaissance is the first step of the kill chain when conducting a penetration test or an attack against a network or server target. An attacker will typically dedicate up to seventy-five percent of the overall work effort for a penetration test to reconnaissance, as it is this phase that allows the target to be defined, mapped, and explored for the vulnerabilities that will eventually lead to exploitation.
There are two types of reconnaissance: passive reconnaissance, and active reconnaissance.
Generally, passive reconnaissance is concerned with analyzing information that is openly available, usually from the target itself or public sources online. On accessing this information, the tester or attacker does not interact with the target in an unusual manner—requests and activities will not be logged, or will not be traced directly to the tester. Therefore, passive reconnaissance is conducted first to minimize the direct contact that may signal an impending attack or to identify the attacker.
In this chapter, you will learn the principles and practices of passive reconnaissance, which include the following:
- Basic principles of reconnaissance
- Open-source intelligence (OSINT)
- DNS reconnaissance and route mapping, including issues with IPv4 and IPv6
- Obtaining user information
- Profiling users for password lists
Active reconnaissance, which involves direct interaction with the target, will be covered in Chapter 3, Active Reconnaissance and Vulnerability Scanning.
- 白話網(wǎng)絡安全2:網(wǎng)安戰(zhàn)略篇
- INSTANT Netcat Starter
- Rootkit和Bootkit:現(xiàn)代惡意軟件逆向分析和下一代威脅
- 黑客攻防與電腦安全從新手到高手(微視頻+火力升級版)
- 網(wǎng)絡安全意識導論
- 計算機病毒分析與防范大全(第3版)
- Web安全與攻防入門很輕松(實戰(zhàn)超值版)
- ARM匯編與逆向工程:藍狐卷·基礎知識
- Learning Devise for Rails
- Digital Forensics with Kali Linux
- 從實踐中學習Kali Linux滲透測試
- 情報驅動應急響應
- SQL Injection Strategies
- 白話零信任
- Kali Linux高級滲透測試(原書第4版)