官术网_书友最值得收藏!

Summary

The first real step in the attack process or kill chain is to conduct reconnaissance to identify the target and potential attack routes. Passive reconnaissance assesses data that is publicly available. This is a stealthy assessment—the IP address or activities of the attacker are almost indistinguishable from normal access. Nevertheless, this information can be critical when conducting social engineering attacks, or facilitating other attack types.

In the next chapter, we will assess the types of reconnaissance that are more active. Although these techniques produce more information, there is an increased risk of detection. Therefore, the emphasis will be on advanced stealth techniques.

主站蜘蛛池模板: 凌海市| 那坡县| 正宁县| 永仁县| 桓台县| 桂平市| 永川市| 巩留县| 云浮市| 宁海县| 牙克石市| 延吉市| 富蕴县| 那曲县| 湟源县| 普宁市| 辽宁省| 巫山县| 开阳县| 斗六市| 克拉玛依市| 天镇县| 宜良县| 迁安市| 柯坪县| 伊吾县| 红河县| 夏津县| 遂川县| 乌兰察布市| 西畴县| 长沙市| 大新县| 宽甸| 牟定县| 息烽县| 汉沽区| 长岭县| 尖扎县| 开化县| 双江|