-
Book Overview & Buying
-
Table Of Contents
Reconnaissance for Ethical Hackers
By :
The internet contains lots of websites, open databases, and servers that store data about people, networks, and organizations. Before an adversary launches a cyber-attack on their target, the attacker spends sufficient time researching the target to better understand their infrastructure and identify any security vulnerabilities that can be exploited to gain a foothold. Attackers gather and analyze OSINT from multiple data sources to create a profile of their target, which helps to identify targeted hosts, servers, operating systems, network block information, IP addresses, geo-location, subdomains, and so on. Such information is very useful in planning a cyber-attack as it enables the attacker to determine the attack surface of the targeted organization.
As an ethical hacker with a good moral compass and intentions, using the same TTPs as adversaries can help organizations identify how they are intentionally or unintentionally leaking sensitive...
Change the font size
Change margin width
Change background colour