alternative
  • Home (current)
  • About
  • Tutorial
    Technologies
    Deep Learning
    Statistics for AIML
    Natural Language Processing
    Machine Learning
    SQL -Structured Query Language
    Python
    Ethical Hacking
    Java
    Placement Preparation
    Quantitative Aptitude
    View All Tutorial
  • Quiz
    SQL -Structured Query Language
    Quantitative Aptitude
    Java
    View All Quiz Course
  • Q & A
    Quantitative Aptitude
    Java
    View All Q & A course
  • Programs
  • Articles
    Artificial Intelligence & Machine Learning Project
    How to publish your local website on github pages with a custom domain name?
    How to download and install Xampp on Window Operating System ?
    How To Download And Install MySql Workbench
    How to install Pycharm ?
    How to install Python ?
    How to download and install Visual Studio IDE taking an example of C# (C Sharp)
    View All Post
  • Tools
    Program Compiler
    Sql Compiler
    Replace Multiple Text
    Meta Data From Multiple Url
  • Contact
  • User
    Login
    Register

Ethical Hacking - Ethical Hacking Phases - Reconnaisance / Footprinting Tutorial

It is a process used for gathering information of a target machine/system. It is first process of ethical hacking.

There are classified into two type of reconnaissance, based on the way of collection information from target system.

  • Active Reconnaissance

In this process you will directly interact with target machine to gather information. This information is accurate. But it has risk of detection if hacker are performing without permission.

As the name itself say active, which means it done actively by direct contact with target machine which  can increase the chance of detection.

 

Information can be collected by browsing through website of the target system to collect information, by collecting information from unlogged email id in browser, etc.

 

  • Passive Reconnaissance

In this process you will indirectly / not directly interact with target machine to gather information. This information is may be accurate. It has less or no risk.

 

As the name itself say passive, which means it done passively without direct contact with target machine.

 

Information can be collected using Whois Search, Collecting IP address, Modification in DNS records, collecting organisational information from browsing through various social sites or blogs.

 

Usually both types of reconnaissance are important in order to gain information of target machine as much as possible and to create proper attack plan.

This process is a foundation for all the other process required to hack target machine.

Ethical Hacking

Ethical Hacking

  • Introduction
  • Overview
    • Information Technology
    • Ethical Hacking
    • Types Of Hacker
    • Phase Of Hacking
  • Environmental Setup
    • Download Virtual Box
    • Install Kali Linux OS in Virtual Box
    • Resize Kali Linux To Full Screen
  • Ethical Hacking Phases
    • Common Technique to Gather Information
    • Reconnaisance / Footprinting
    • Fingerprinting
    • Sniffing
    • ARP Poisioning
    • SQL Injection
    • Cross Site Scripting
    • Social Engineering
    • Denial of service Attack
    • Session Hijacking

About Fresherbell

Best learning portal that provides you great learning experience of various technologies with modern compilation tools and technique

Important Links

Don't hesitate to give us a call or send us a contact form message

Terms & Conditions
Privacy Policy
Contact Us

Social Media

© Untitled. All rights reserved. Demo Images: Unsplash. Design: HTML5 UP.