- Mastering Kali Linux for Advanced Penetration Testing
- Robert W. Beggs
- 214字
- 2021-07-16 11:33:22
Chapter 3. Active Reconnaissance and Vulnerability Scanning
The objective of the reconnaissance phase is to gather as much information about the target as possible in order to facilitate the exploitation phase of the kill chain.
We have seen how passive reconnaissance, which is almost undetectable, can yield a significant amount of information about the target organization and its users.
Active reconnaissance builds on the results of open-source intelligence and passive reconnaissance, and focuses on using probes to identify the path to the target and the exposed attack surface of the target. In general, complex systems have a greater attack surface, and each surface may be exploited and then leveraged to support additional attacks.
Although active reconnaissance produces more information, and more useful information, interactions with the target system may be logged, triggering alarms by protective devices, such as firewalls and intrusion detection systems. As the usefulness of the data to the attacker increases, so does the risk of detection; this is shown in the following diagram:

To improve the effectiveness of active reconnaissance in providing detailed information, our focus will be on using stealthy, or difficult to detect, techniques.
In this chapter, you will learn:
- Stealth scanning strategies
- Network infrastructure, host discovery, and enumeration
- Comprehensive reconnaissance applications, especially
recon-ng
- Targeted vulnerability scanning
- Extending Symfony2 Web Application Framework
- DevSecOps敏捷安全
- 黑客大曝光:無線網絡安全(原書第3版)
- Wireshark 2 Quick Start Guide
- 等級保護測評理論及應用
- 網絡安全技術及應用(第3版)
- Kali Linux Wireless Penetration Testing Cookbook
- Testing and Securing Android Studio Applications
- 計算機網絡安全技術研究
- 情報驅動應急響應
- 博弈論與數據安全
- 數字政府網絡安全合規性建設指南:密碼應用與數據安全
- 計算機網絡安全實驗指導
- 隱私保護機器學習
- 安全網絡構建