123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Technology,-Gadget-and-Science >> View Article

Reconnaissance

Profile Picture
By Author: Wisemonkeys
Total Articles: 277
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Reconnaissance is the best practice for discovering and collecting information about a system. Reconnaissance derives from military language, which refers to a mission to obtain information from enemy territory.

HOW DOES RECONNAISSANCE WORK;

Reconnaissance generally follows seven steps:

Collect initial information
Determine the network range
Identify active machines
Find access points and open ports
Fingerprint the operating system
Discover services on ports
Map the network
Using these steps, an attacker will aim to gain the following information about a network:

File permissions
Running network services
OS platform
Trust relationships
User account information
One of the most common techniques involved with reconnaissance is port scanning, which sends data to various TCP and UDP (user datagram protocol) ports on a device and evaluates the response.

THE TWO PHASES OF RECONNAISSANCE IN ETHICAL HACKING ARE AS FOLLOWS;

Active reconnaissance
Passive reconnaissance
1. Active reconnaissance:-

Dynamic ...
... reconnaissance is the kind of reconnaissance where you assemble data about the framework/application by straightforwardly connecting with the framework. At the point when you utilize Active reconnaissance, there is a high possibility that some data like your IP address is known by the framework you are attempting to accumulate the data about.

2. Passive reconnaissance:-

On account of Passive reconnaissance, you assemble data without interfacing with the framework/application you are attempting to think about. You accumulate data through web indexes or freely available reports. At the point when you utilize Passive reconnaissance, it is highly unlikely that the framework would know your IP address.

HOW TO PREVENT RECONNAISSANCE?

Organizations can use penetration testing to determine what their network would reveal in the event of a reconnaissance attack. Organizations can outsource the work by hiring security testing professionals to carry out penetration testing, vulnerability assessment, compliance testing, etc.

During testing, organizations can deploy port scanning tools (which scan large networks and determine which hosts are up) and vulnerability scanners (which find known vulnerabilities in the network).

SIEM solutions can also detect source IPs that are running a port scanning tool in your network.

Steps followed in reconnaissance –

Accumulate inceptive data
Decide the range of the network
Recognize all active machines
Get hold of the OS being used
Uniquely mark the working framework
Reveal services used on ports
Understand the network map
An example used in Reconnaissance:-

Reconnaissance is mainly used for gaining information by visual observation or other detection methods, about the activities and resources of an enemy or potential enemy, or about the meteorologic, hydrographic, or geographic characteristics of a particular area.

Launched to world in 2017, Wisemonkeys(https://wisemonkeys.info/) is now a robust Learning management system.
Just follow a 3-step registration process and get connected. Since we appreciate genuine users and do not encourage spammers we follow small registration process:
1.Sign up(https://me.wisemonkeys.info/login)
2.Confirm your email. (for the first time the email might fall in your spam/junk/promotion folder. Please mark it not spam and confirm the link).
3.Login and get started.
4.Or Login via Google/Microsoft.

Our hardworking team is thriving hard to make this platform better and better. If you have any suggestions and feedback, then do write to us at: genius@wisemonkeys.info

Total Views: 503Word Count: 469See All articles From Author

Add Comment

Technology, Gadget and Science Articles

1. Inductive Position Sensor Market Analysis: Global Trends, Technologies, And Forecast To 2035
Author: Shreya

2. Rare Disease Diagnostics Market: Global Trends, Growth Drivers, And Forecast 2025–2035
Author: Shreya

3. Color Plays A Significant Role In How People Perceive Your Brand
Author: printitusa

4. Elevating Recognition Programs With A Smarter Awards And Certificates Platform
Author: Awardocado

5. Scrape Product And Price Data From Grocery Express Analysis
Author: Web Data Crawler

6. Erp Vs Business Intelligence: Key Differences & Which One You Need
Author: Focus Softnet

7. Redefining Event Experiences Through A Powerful Event Mobile App
Author: Enseur

8. Web Scraping Flexjobs Data For Remote Hiring And Skill Demand
Author: REAL DATA API

9. Smart Hands It Hardware Replacement Services: The Strategic Lifecycle Management Solution
Author: Kumar

10. Scrape Pinterest Pins And Boards For Trend Forecasting
Author: REAL DATA API

11. Myntra Dataset Helped A Retailer Analyze Fashion Products
Author: Actowiz Solutions

12. Web Scraping Hepsiburada Product Data For Market Insights
Author: Retail Scrape

13. Scrape In-n-out Burger Restaurant Locations Data In Usa
Author: Food Data Scraper

14. Uae E-commerce & Retail Prices Data Analytics
Author: Actowiz Metrics

15. Duka La Pombe Data Extraction For Liquor Price Analysis
Author: Web Data Crawler

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: