TechnoGb
Ethical Hacking

Reconnaissance | Ethical Hacking | TechnoGb

reconnaissance

The word Reconnaissance is derived or borrowed from its military use, where it means as a Mission into enemy territory to gather all the necessary information. Now if we talk in the terms of Computer and the digital world then Reconnaissance is usually a preliminary step toward the further attack seeking to exploit the target system.

In the field of Ethical Hacking and Cyber Security, The first step to penetrate into your target is Information Gathering and getting to know about your target system is one of the basic and initial steps for Ethical Hacking.

Now first let’s talk about Reconnaissance, what does it really mean in the technical form?

So, Reconnaissance is a set of process and technique which is used to discover and collect information about the target system.

During the Reconnaissance process, the Hacker/Attacker tries to gather as much information about the target system as possible. So, here I am listing the important seven steps during the Reconnaissance Process:

  • Gather Initial Information
  • Determine the network Range
  • Identify the Active Machine / System
  • Discover the Open Ports
  • Fingerprint the target Operating System
  • Uncover all the services on ports
  • Map the identified Network

We are going to discuss in detail in the Upcoming Chapters of this course. Now let’s discuss the types of Reconnaissance. So, It is of two types Active Reconnaissance and other is Passive Reconnaissance.

 



ACTIVE RECONNAISSANCE  

Active Reconnaissance is a type of Reconnaissance in which the Attacker / Intruder directly engages with the targeted system to all the necessary information about the vulnerabilities. In Active Reconnaissance the Attacker often port scanning, mainly to discover all the vulnerable ports. And after discovering the port vulnerability (using port scanning) an attacker usually exploits all the known vulnerabilities of the services associated with the detected open ports.
Sometimes, Both Active an Passive Reconnaissance is referred as the passive attacks just because they are just seeking information rather than actively exploit the target as all Attackers / Hackers do.



PASSIVE RECONNAISSANCE

The Passive Reconnaissance is somewhat different than the Active Reconnaissance, As in the Passive Reconnaissance the attacker / Hacker attempt to gain the information about the targeted computers and network without actively engaging with the system.
The term Reconnaissance is derived from its military use which describes the information gathering mission. And sometimes both type of Reconnaissance is referred as the Passive Attack because the purpose of both the attacks is same i.e. to obtain information rather than regurressly exploiting the system or the target. However, Reconnaissance is the basic step taken towards the exploitation of the target system.
In the Ethical Hacking process, both Active and Passive Reconnaissance is used in which the Hacker / Attacker use the attack method to determine the system vulnerabilities so, that all the problems can be taken care of before proceeding for Real Attack to the target system.
One of the simplest and Basic step to protect yourself or your system or your organization from all types of Reconnaissance attacks is to use good Firewall and Intrusion Prevention System (IPS). 
The role of Firewall is to control which all ports of a system are exposed and to whom it is exposed I mean who all can discover it by simple Reconnaissance scan. Whereas the role of Intrusin Prevention System (IPS) is to detect all the Port Scanning which are in progress over the system and immediately shuts them down before the Attacker / Hacker are able to gain all the information about your system over the network.

#hack_ethically  #hack_smartly



Summary
Reconnaissance | Ethical Hacking | TechnoGb
Article Name
Reconnaissance | Ethical Hacking | TechnoGb
Description
The word Reconnaissance is derived or borrowed from its military use, where it means as a Mission into enemy territory to gather all the necessary information. Now if we talk in the terms of Computer and the digital world then Reconnaissance is usually a preliminary step toward the further attack seeking to exploit the target system
Author
Publisher Name
TechnoGb
Publisher Logo

Related posts

Fingerprinting | Ethical Hacking | TechnoGb

Deepanshu Rai

Enumeration | Third Step of Ethical Hacking | TechnoGb

Deepanshu Rai

ANDROID DEVICE VULNERABILITY AND HACKING | TechnoGb

Deepanshu Rai

Leave a Comment