官术网_书友最值得收藏!

Reconnaissance

The previous chapter gave you an overall view of all the stages of the cyber-attack life cycle. This chapter will go into the first phase of the life cycle in depth—reconnaissance. Reconnaissance is one of the most important stages of a threat life cycle, where attackers search for vulnerabilities that they can use to attack targets. An attacker will be interested in locating and gathering data, and identifying any loopholes in a target's network, its users, or its computing systems. Reconnaissance is done both passively and actively, borrowing tactics that have been used by the military. It can be compared to the sending of spies into an enemy's territory to gather data about where and when to strike. When reconnaissance is done in the right way, the target should not be able to know that it is being done. This critical attack life cycle phase can be actualized in a number of ways, which are broadly classified as external and internal reconnaissance.

This chapter is going to discuss the following topics:

  • External reconnaissance:
    • Dumpster diving
    • The use of social media to obtain information about the target
    • Social engineering
  • Tools used to perform internal reconnaissance
主站蜘蛛池模板: 滁州市| 彭阳县| 玉门市| 涞源县| 仁布县| 潞城市| 繁峙县| 吉木萨尔县| 平原县| 竹山县| 锡林浩特市| 海城市| 怀来县| 澄迈县| 通辽市| 体育| 天津市| 新疆| 峨眉山市| 梧州市| 平利县| 武隆县| 木兰县| 志丹县| 木兰县| 茌平县| 利川市| 南郑县| 沙田区| 广平县| 阳高县| 荆门市| 勐海县| 香格里拉县| 原阳县| 广平县| 兴安盟| 建湖县| 兴安县| 临沂市| 海门市|