官术网_书友最值得收藏!

Basic principles of reconnaissance

Reconnaissance, or recon, is the first step of the kill chain when conducting a penetration test or attack against a data target. This is conducted in before the actual test or attack of a target network. The findings will give a direction to where additional reconnaissance may be required, or the vulnerabilities to attack during the exploitation phase.

Reconnaissance activities are segmented on a gradient of interactivity with the target network or device.

Basic principles of reconnaissance

Passive reconnaissance does not involve direct interaction with the target network. The attacker's source IP address and activities are not logged (for example, a Google search for the target's e-mail addresses). It is difficult, if not impossible, for the target to differentiate passive reconnaissance from normal business activities.

In general, passive reconnaissance focuses on the business and regulatory environment, the company, and the employees. Information of this type is available on the Internet or other public sources, and is sometimes referred to as open source intelligence, or OSINT.

  • Passive reconnaissance also involves the normal interactions that occur when an attacker interacts with the target in an expected manner. For example, an attacker will log on to the corporate website, view various pages, and download documents for further study. These interactions are expected user activities, and are rarely detected as a prelude to an attack on the target.
  • Active reconnaissance involves direct queries or other interactions (for example, port scanning of the target network) that can trigger system alarms or allow the target to capture the attacker's IP address and activities. This information could be used to identify and arrest an attacker, or during legal proceedings. Because active reconnaissance requires additional techniques for the tester to remain undetected, it will be covered in Chapter 3, Active Reconnaissance and Vulnerability Scanning.

Penetration testers or attackers generally follow a process of structured information gathering, moving from a broad scope (the business and regulatory environments) to the very specific (user account data).

To be effective, testers should know exactly what they are looking for and how the data will be used before collection starts. Using passive reconnaissance and limiting the amount of data collected minimizes the risks of being detected by the target.

主站蜘蛛池模板: 固始县| 剑川县| 马山县| 富平县| 同德县| 玉林市| 泗洪县| 灵武市| 南川市| 曲阳县| 定西市| 正阳县| 横山县| 罗江县| 阿拉善盟| 六安市| 习水县| 东乡| 新蔡县| 中牟县| 孟村| 塔河县| 广河县| 安吉县| 成武县| 田阳县| 仁寿县| 星座| 泰顺县| 确山县| 临沭县| 札达县| 林周县| 秦安县| 辽阳县| 绥化市| 牡丹江市| 肇州县| 东阿县| 东乌珠穆沁旗| 建始县|