Question: Explain reconnaissance techniques : Active Scanning: Port Examination Scanning for vulnerabilities Website Directory brute-force Search Open Technical Databases: Search Engines Social Networks Search Open Websites/Domains:

Explain reconnaissance techniques :

  • Active Scanning:

Port Examination

Scanning for vulnerabilities

Website Directory brute-force

  • Search Open Technical Databases:

Search Engines

Social Networks

  • Search Open Websites/Domains:

Whois information

DNS records

Subdomain enumeration

Discover the web technologies and stacks that are used.

Determine your weaknesses.

  • Obtain Victim Identity Information:

Emails \Credentials

Employee Names

  • Gather Victims Network Data:

DNS characteristics

third-party domains

Network topology

IP addresses

infrastructure for security

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Computer Network Questions!