官术网_书友最值得收藏!

Summary

The first real step in the attack process or kill chain is to conduct reconnaissance to identify the target and potential attack routes. Passive reconnaissance assesses data that is publicly available. This is a stealthy assessment—the IP address or activities of the attacker are almost indistinguishable from normal access. Nevertheless, this information can be critical when conducting social engineering attacks, or facilitating other attack types.

In the next chapter, we will assess the types of reconnaissance that are more active. Although these techniques produce more information, there is an increased risk of detection. Therefore, the emphasis will be on advanced stealth techniques.

主站蜘蛛池模板: 陇南市| 隆化县| 合阳县| 壶关县| 浪卡子县| 曲阳县| 永清县| 崇信县| 鹤峰县| 合山市| 永安市| 班戈县| 吴江市| 固始县| 延安市| 科尔| 闵行区| 宁化县| 昔阳县| 新野县| 兴国县| 肇州县| 松原市| 睢宁县| 邯郸县| 阿勒泰市| 汉中市| 仁寿县| 仙桃市| 奉新县| 库车县| 资阳市| 南康市| 麦盖提县| 新野县| 卢氏县| 离岛区| 万荣县| 奉节县| 原平市| 沾化县|