官术网_书友最值得收藏!

Summary

The first real step in the attack process or kill chain is to conduct reconnaissance to identify the target with the use of OSINT. Passive reconnaissance provides a complete attacker's view of a company. This is a stealthy assessment – the IP address and the activities of the attacker are almost indistinguishable from normal access. Nevertheless, this information can be critical when conducting social engineering attacks or facilitating other attack types. We have now built our own custom script to save time and perform passive reconnaissance using OSINT.

In the next chapter, we will assess the types of reconnaissance that are active and also make use of OSINT results. Although active reconnaissance techniques produce more information, there is an increased risk of detection. Therefore, the emphasis will be on advanced stealth techniques.

主站蜘蛛池模板: 榆树市| 大安市| 前郭尔| 开阳县| 桂平市| 仙游县| 襄汾县| 来宾市| 鲜城| 龙游县| 昭觉县| 乌什县| 石楼县| 宜宾市| 石嘴山市| 富平县| 花莲市| 水富县| 鄂州市| 连江县| 米泉市| 商河县| 海盐县| 常州市| 和静县| 南部县| 安福县| 马尔康县| 九台市| 城市| 板桥市| 古田县| 兰溪市| 平定县| 奇台县| 高邑县| 衡水市| 正蓝旗| 镇坪县| 沂水县| 甘南县|