From the course: Deep Dive into Open-Source Intelligence
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Introduction to active reconnaissance
From the course: Deep Dive into Open-Source Intelligence
Introduction to active reconnaissance
- [Teacher] When performing active reconnaissance an attacker engages with the targeted system to gather information. The interaction between the attacker and the target may trace back to the attacker or set off alarms indicating an incoming threat. While passive reconnaissance has the upper hand when it comes to stealth, active reconnaissance is often quicker and more accurate. There's been plenty of times during penetration tests where I wasn't able to obtain information about public systems using passive reconnaissance techniques. For example, systems that have been recently exposed to the internet may not have been active long enough for third parties to run scans against them. This may result in limited information available using passive sources. In situations where passive reconnaissance doesn't provide the desired result, or speed takes priority over stealth, attackers may revert to active reconnaissance…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
OSINT overview2m 38s
-
Understanding the value of OSINT2m 23s
-
(Locked)
Introduction to passive reconnaissance3m 8s
-
(Locked)
Introduction to active reconnaissance2m 39s
-
(Locked)
Pros and cons of active and passive reconnaissance2m 26s
-
(Locked)
Introduction to sources of OSINT4m 39s
-
(Locked)
Introduction to VPN and anonymizers2m 49s
-
-
-
-
-