Welcome to the Recon Folder!
🔹 Passive Reconnaissance: This involves gathering information without directly interacting with the target. It includes techniques like open-source intelligence (OSINT) gathering, analyzing publicly available information, and searching for vulnerabilities.
🔹 Active Reconnaissance: In this phase, an attacker engages with the target system to gather information actively. It may include techniques like port scanning, vulnerability scanning, and network mapping.
🔹 Social Engineering: Reconnaissance can also involve social engineering techniques to gather information from individuals or organizations. This includes methods like phishing, pretexting, and impersonation.
🔹Nmap: A powerful network scanning tool used for port scanning and network mapping.
🔹Wireshark: A network protocol analyzer for capturing and analyzing network traffic.
🔹Nikto: A web server scanner that performs comprehensive vulnerability assessments.
🔹Gobuster: A tool used for directory and DNS busting during reconnaissance.
These are just a few examples of tools used in reconnaissance. Remember to always use these tools responsibly and legally, respecting the privacy and security of others.
Here are some additional resources to learn more about Reconnaissance:
🔹The Web Application Hacker's Handbook by Dafydd Stuttard and Marcus Pinto
🔹OSINT Framework: A collection of various tools and resources for OSINT.
🔹OWASP Top Ten Project: A list of the top ten most critical web application security risks