Passive reconnaissance is an attempt to gain information about targeted computers and networks without actively engaging with the system. In contrast, an attacker engages with the target system during active reconnaissance, typically conducting a port scan to find open ports. The term reconnaissance comes from its military use to describe an information-gathering mission. Methods of passive reconnaissance include: - Performing an advanced Google search to gather information about a website.
- War driving to detect vulnerable wireless networks.
- Using a free online tool like Netcraft to gather information about webservers.
- Looking for information stored on discarded computers and other devices.
Reconnaissance is an important part of ethical hacking and bug bounty programs. In this proactive approach to security management, security experts mimic the behavior of attackers in order to identify vulnerabilities. The use of both a firewall and an intrusion prevention system (IPS) can make reconnaissance more difficult. The firewall controls to which ports are exposed and to whom they are visible, while the IPS will detect port scans in progress and shut them down. Both active and passive reconnaissance are sometimes referred to as passive attacks because the purpose is simply to obtain information, rather than to actively exploit the target. However, both types of reconnaissance are often a preliminary step towards exploiting the target system. |
No comments:
Post a Comment