- Mastering Kali Linux for Advanced Penetration Testing
- Robert W. Beggs
- 229字
- 2021-07-16 11:33:20
Chapter 2. Identifying the Target – Passive Reconnaissance
Reconnaissance is the first step of the kill chain when conducting a penetration test or an attack against a network or server target. An attacker will typically dedicate up to seventy-five percent of the overall work effort for a penetration test to reconnaissance, as it is this phase that allows the target to be defined, mapped, and explored for the vulnerabilities that will eventually lead to exploitation.
There are two types of reconnaissance: passive reconnaissance, and active reconnaissance.
Generally, passive reconnaissance is concerned with analyzing information that is openly available, usually from the target itself or public sources online. On accessing this information, the tester or attacker does not interact with the target in an unusual manner—requests and activities will not be logged, or will not be traced directly to the tester. Therefore, passive reconnaissance is conducted first to minimize the direct contact that may signal an impending attack or to identify the attacker.
In this chapter, you will learn the principles and practices of passive reconnaissance, which include the following:
- Basic principles of reconnaissance
- Open-source intelligence (OSINT)
- DNS reconnaissance and route mapping, including issues with IPv4 and IPv6
- Obtaining user information
- Profiling users for password lists
Active reconnaissance, which involves direct interaction with the target, will be covered in Chapter 3, Active Reconnaissance and Vulnerability Scanning.
- Node Security
- Wireshark 2 Quick Start Guide
- Kali Linux Wireless Penetration Testing Cookbook
- 零信任網絡:在不可信網絡中構建安全系統(第2版)
- 云原生安全與DevOps保障
- 計算機網絡安全基礎(第5版)
- 數據安全與流通:技術、架構與實踐
- 數據要素安全:新技術、新安全激活新質生產力
- INSTANT Apple Configurator How-to
- 網絡空間安全:拒絕服務攻擊檢測與防御
- Mastering Linux Security and Hardening
- Securing Network Infrastructure
- 一本書讀透金融科技安全
- Instant OSSEC Host-based Intrusion Detection System
- ATT&CK視角下的紅藍對抗實戰指南