官术网_书友最值得收藏!

Summary

The first real step in the attack process or kill chain is to conduct reconnaissance to identify the target and potential attack routes. Passive reconnaissance assesses data that is publicly available. This is a stealthy assessment—the IP address or activities of the attacker are almost indistinguishable from normal access. Nevertheless, this information can be critical when conducting social engineering attacks, or facilitating other attack types.

In the next chapter, we will assess the types of reconnaissance that are more active. Although these techniques produce more information, there is an increased risk of detection. Therefore, the emphasis will be on advanced stealth techniques.

主站蜘蛛池模板: 高雄市| 肇庆市| 文成县| 娄底市| 利津县| 庄浪县| 文山县| 将乐县| 高雄县| 涞水县| 连山| 永善县| 莲花县| 灯塔市| 南雄市| 开化县| 德格县| 通山县| 虞城县| 怀安县| 新安县| 麦盖提县| 连云港市| 盐亭县| 静海县| 寿宁县| 西华县| 新野县| 双牌县| 金川县| 威远县| 宁陵县| 望城县| 陵水| 偏关县| 和林格尔县| 东兴市| 临夏市| 禄丰县| 孟村| 班玛县|