- Mastering Kali Linux for Advanced Penetration Testing
- Robert W. Beggs
- 105字
- 2021-07-16 11:33:21
Summary
The first real step in the attack process or kill chain is to conduct reconnaissance to identify the target and potential attack routes. Passive reconnaissance assesses data that is publicly available. This is a stealthy assessment—the IP address or activities of the attacker are almost indistinguishable from normal access. Nevertheless, this information can be critical when conducting social engineering attacks, or facilitating other attack types.
In the next chapter, we will assess the types of reconnaissance that are more active. Although these techniques produce more information, there is an increased risk of detection. Therefore, the emphasis will be on advanced stealth techniques.
推薦閱讀
- DevSecOps敏捷安全
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- INSTANT Burp Suite Starter
- Learning Veeam? Backup & Replication for VMware vSphere
- 代碼審計:企業級Web代碼安全架構
- Applied Network Security
- 隱私計算
- 信息安全案例教程:技術與應用(第2版)
- 信息安全導論(第2版)
- 從實踐中學習密碼安全與防護
- 數據安全架構設計與實戰
- 數字政府網絡安全合規性建設指南:密碼應用與數據安全
- 交換機·路由器·防火墻(第2版)
- Web安全攻防從入門到精通
- 黑客攻防與電腦安全從新手到高手(超值版)