官术网_书友最值得收藏!

Reconnaissance

In this first phase, before taking any action, the attacker must be prepared by carrying out an information-gathering exercise on the target. The attacker collects, from many sources, every piece of publicly available sensitive information, such as target clients, employees, and network information. At the end of this phase, the hacker will have a clear view of the network (domain name, IP ranges, TCP/UDP services, and authentication mechanisms), the system (user/group names, system banners, and system architecture), and organizational information (employee details, press released, and location). There are two types of reconnaissance or footprinting.

主站蜘蛛池模板: 泰安市| 明溪县| 福建省| 青浦区| 洱源县| 武鸣县| 盐山县| 铜梁县| 琼中| 株洲市| 台东县| 密山市| 内乡县| 凤山县| 彩票| 龙井市| 连平县| 贵阳市| 华亭县| 教育| 朔州市| 齐齐哈尔市| 聂荣县| 天津市| 鸡西市| 鄄城县| 永顺县| 柘荣县| 分宜县| 兴国县| 泽库县| 玛多县| 田阳县| 始兴县| 郁南县| 东宁县| 城固县| 景德镇市| 南汇区| 台北市| 邢台市|