wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Reconnaissance

profile
Jermin Shaikh
Aug 30, 2022
0 Likes
0 Discussions
180 Reads

Reconnaissance is the best practice for discovering and collecting information about a system. Reconnaissance derives from military language, which refers to a mission to obtain information from enemy territory.

HOW DOES RECONNAISSANCE WORK;

Reconnaissance generally follows seven steps:

  1. Collect initial information
  2. Determine the network range
  3. Identify active machines
  4. Find access points and open ports 
  5. Fingerprint the operating system
  6. Discover services on ports
  7. Map the network

Using these steps, an attacker will aim to gain the following information about a network:

  • File permissions
  • Running network services
  • OS platform
  • Trust relationships
  • User account information 

One of the most common techniques involved with reconnaissance is port scanning, which sends data to various TCP and UDP (user datagram protocol) ports on a device and evaluates the response. 

THE TWO PHASES OF RECONNAISSANCE IN ETHICAL HACKING ARE AS FOLLOWS;

  • Active reconnaissance
  • Passive reconnaissance

1. Active reconnaissance:-

Dynamic reconnaissance is the kind of reconnaissance where you assemble data about the framework/application by straightforwardly connecting with the framework. At the point when you utilize Active reconnaissance, there is a high possibility that some data like your IP address is known by the framework you are attempting to accumulate the data about. 

2. Passive reconnaissance:-

On account of Passive reconnaissance, you assemble data without interfacing with the framework/application you are attempting to think about. You accumulate data through web indexes or freely available reports. At the point when you utilize Passive reconnaissance, it is highly unlikely that the framework would know your IP address.

HOW TO PREVENT RECONNAISSANCE?

Organizations can use penetration testing to determine what their network would reveal in the event of a reconnaissance attack. Organizations can outsource the work by hiring security testing professionals to carry out penetration testing, vulnerability assessment, compliance testing, etc.

During testing, organizations can deploy port scanning tools (which scan large networks and determine which hosts are up) and vulnerability scanners (which find known vulnerabilities in the network).

SIEM solutions can also detect source IPs that are running a port scanning tool in your network.

Steps followed in reconnaissance –

  • Accumulate inceptive data 
  • Decide the range of the network 
  • Recognize all active machines 
  • Get hold of the OS being used 
  • Uniquely mark the working framework 
  • Reveal services used on ports 
  • Understand the network map

An example used in Reconnaissance:-

Reconnaissance is mainly used for gaining information by visual observation or other detection methods, about the activities and resources of an enemy or potential enemy, or about the meteorologic, hydrographic, or geographic characteristics of a particular area.

 


Comments ()


Sign in

Read Next

Fitness

Blog banner

objectives and functions of operating system

Blog banner

AN EVENT-BASED DIGITAL FORENSIC INVESTIGATION

Blog banner

"Mahakali cave"

Blog banner

5 Things I As A Dentist Would Never Do (And What You Can Learn From It)

Blog banner

Defining youtubr

Blog banner

Virtual Memory

Blog banner

Swiggi

Blog banner

Memory Management

Blog banner

The Sunny Side of Instagram

Blog banner

Virtual Memory - Explaination, Working, Steps

Blog banner

american greatines

Blog banner

Evolution of Operating System

Blog banner

Love is in air.....

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

Linux 94

Blog banner

Modern operating system

Blog banner

Dekkers Algorithm : Ensuring Safe Process Synchronization

Blog banner

Evolution of Operating system

Blog banner

Threat from Inside: Educating the Employees Against Cyber Threats

Blog banner

Security Issues and Countermeasures

Blog banner

DIGITAL ECONOMY

Blog banner

The Procedural Framework for Corporate High-Tech Investigations

Blog banner

Have You Explored India Yet?

Blog banner

The Power of Forensic Watermarking in the Fight Against Content Piracy

Blog banner

A-B-C of Networking: Part-2 (Components)

Blog banner

internet email and it's applications

Blog banner

Malware Detection Techniques for Mobile Devices

Blog banner

A book review

Blog banner

Data Exfiltration

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

A True Friendship

Blog banner

Safe Learning Spaces: Why Preschool Environment Matters More Than Ever Today

Blog banner

Cross site scripting Attack

Blog banner

Basic Security For SOAP Services

Blog banner

Hypothesis Testing in Data Science

Blog banner

Southern Turkey Earthquake: Causes and Consequences of a Tragic Natural Disaster

Blog banner

Data Science in Everyday Life (like a phone, shopping cart, or social media icons)

Blog banner

HTML vs HTML5

Blog banner

Paralysis/Paralysis Stroke

Blog banner

Memory management and virtual memory

Blog banner

Celebrate Diwali the Delicious Way with Meal Maharaj Catering

Blog banner