أنشئ حسابًا أو سجّل الدخول للانضمام إلى مجتمعك المهني.
Reconnaissance attack is a kind of information gathering on network system and services on negative/theft way.
there is servel way of reconnaissance,
1: Torjon
2: Fishing
3: Spam Mail
4: Social Networks
5: Mailcious mail link or webiste link
6: Free application software like antivirous
7: any others free apps
A type of attack in which an intruder engages with your system to gather information about vulnerabilities.
Gathering information about victim, the word reconnaissance is a military word meaning the process of obtaining information about enemy forces or mission into enemy territory to obtain information.
In computer security reconnaissance is a type of computer attack in which an intruder engages with the targeted system to gather information about vulnerabilities.
The attacker first discovers any vulnerable ports by using software’s like port scanning. After a port scan, an attacker usually exploits known vulnerabilities of services associated with open ports that were detected.
To prevent most port scan attacks or reconnaissance attacks is to use a good firewall and intrusion prevention system (IPS). The firewall controls which ports are exposed and to whom they are visible. The IPS can detect port scans in progress and shut them down before the attacker can gain a full map of your network
The term reconnaissance refers to the first preattack phase of the hacking process: it involves information-gathering behaviors that aim to profile the target organization or network for the efficient attack tactics. Reconnaissance can be classified into five types.
The reconnaissance target range may include the target organization's clients, employees, operations, network and systems.
TYPES OF RECONNAISSANCE ATTACKS
Reconnaissance is a kind of attack in which attacker gather the information about the targeted PC and in most cases, precedes an actual access or DoS attack. The intruder queries the alive IP in the network and then for the ports to determine the type and version of the application and operating system running on the target host.
We can prevent this attack by configuring intrusion prevention system in the network. Though the security administrator still needs conduct the penetration testing on the regular interval to avoid such kind of situations.
Hope you find this helpful.
Thanks.