官术网_书友最值得收藏!

Summary

The first real step in the attack process or kill chain is to conduct reconnaissance to identify the target and potential attack routes. Passive reconnaissance assesses data that is publicly available. This is a stealthy assessment—the IP address or activities of the attacker are almost indistinguishable from normal access. Nevertheless, this information can be critical when conducting social engineering attacks, or facilitating other attack types.

In the next chapter, we will assess the types of reconnaissance that are more active. Although these techniques produce more information, there is an increased risk of detection. Therefore, the emphasis will be on advanced stealth techniques.

主站蜘蛛池模板: 札达县| 枝江市| 盐亭县| 翼城县| 贡山| 合阳县| 宜黄县| 四子王旗| 台湾省| 蕉岭县| 改则县| 永嘉县| 台山市| 涞水县| 洱源县| 固始县| 温宿县| 宝清县| 太仆寺旗| 潮州市| 加查县| 凤城市| 鄄城县| 正安县| 六枝特区| 武义县| 肇州县| 平顺县| 横山县| 西安市| 哈巴河县| 运城市| 阿拉善左旗| 镇巴县| 桐柏县| 固镇县| 阿拉善左旗| 柏乡县| 新津县| 莱西市| 勃利县|