- Web Penetration Testing with Kali Linux
- Joseph Muniz Aamir Lakhani
- 322字
- 2021-08-04 10:16:50
Chapter 2. Reconnaissance
The term Reconnaissance by definition comes from the military warfare strategy of exploring beyond the area occupied by friendly forces to gain information about the enemy for future analysis or attack. Reconnaissance of computer systems is similar in nature, meaning typically a Penetration Tester or hacker will attempt to learn as much as possible about a target's environment and system traits prior to launching an attack. This is also known as establishing a Footprint of a target. Reconnaissance is typically passive in nature and in many cases not illegal (however, we are not lawyers and cannot offer legal advice) to perform as long as you don't complete a three-way handshake with an unauthorized system.
Examples of Reconnaissance include anything from researching a target on public sources such as Google, monitoring employee activity to learn operation patterns, and scanning networks or systems to gather information, such as manufacture type, operating system, and open communication ports. The more information that can be gathered about a target brings a better chance of identifying the easiest and fastest method to achieve a penetration goal, as well as best method to avoid existing security. Also, alerting a target will most likely cause certain attack avenues to close as a reaction to preparing for an attack. Kali's official slogan says this best:
"The quieter you become, the more you are able to hear"
Reconnaissance services should include heavy documentation, because data found may be relevant at a later point in the penetration exercise. Clients will also want to know how specific data was obtained, and ask for references to resources. Examples are what tools were used to obtain the data or what publicfacing resources; for example, the specific search query in Google that was submitted to obtain the data. Informing a customer "you obtained the goal" isn't good enough, because the purpose of a Penetration Test is to identify weakness for future repairs.
- 流量的秘密:Google Analytics網站分析與優化技巧(第2版)
- 大學計算機應用基礎實踐教程
- Three.js開發指南:基于WebGL和HTML5在網頁上渲染3D圖形和動畫(原書第3版)
- Responsive Web Design with HTML5 and CSS3
- JavaScript+jQuery開發實戰
- R語言編程指南
- Mastering Drupal 8 Views
- 基于Struts、Hibernate、Spring架構的Web應用開發
- 深度學習:Java語言實現
- Learning jQuery(Fourth Edition)
- MySQL入門很輕松(微課超值版)
- Oracle GoldenGate 12c Implementer's Guide
- 愛上C語言:C KISS
- Python+Office:輕松實現Python辦公自動化
- Learning Bootstrap 4(Second Edition)