Question: Explain reconnaissance techniques : Active Scanning: Port Examination Scanning for vulnerabilities Website Directory brute-force Search Open Technical Databases: Search Engines Social Networks Search Open Websites/Domains:
Explain reconnaissance techniques :
- Active Scanning:
Port Examination
Scanning for vulnerabilities
Website Directory brute-force
- Search Open Technical Databases:
Search Engines
Social Networks
- Search Open Websites/Domains:
Whois information
DNS records
Subdomain enumeration
Discover the web technologies and stacks that are used.
Determine your weaknesses.
- Obtain Victim Identity Information:
Emails \Credentials
Employee Names
- Gather Victims Network Data:
DNS characteristics
third-party domains
Network topology
IP addresses
infrastructure for security
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
