Start networking and exchanging professional insights

Register now or log in to join your professional community.

Follow

What are Reconnaissance Attacks ?

user-image
Question added by Khaled Omar , Senior Service Delivery Engineer , Dell Technologies
Date Posted: 2014/02/03
Tariq Ali
by Tariq Ali , Deputy Manager IT , Kohat Cement Company Limited

Reconnaissance attack is a kind of information gathering on network system and services on negative/theft way.

there is servel way of reconnaissance,

1: Torjon

2: Fishing

3: Spam Mail

4: Social Networks

5: Mailcious mail link or webiste link

6: Free application software like antivirous

7: any others free apps

Mostafa Khamies Dakam
by Mostafa Khamies Dakam , Network Specialist , Libyan Fertilizer Company

A type of attack in which an intruder engages with your system to gather information about vulnerabilities.

Saqib Mehmood
by Saqib Mehmood , Technical Team Lead/Safety Supervisor , Xchange Technology Group

Gathering information about victim, the word reconnaissance is a military word meaning the process of obtaining information about enemy forces or mission into enemy territory to obtain information.

In computer security reconnaissance is a type of computer attack in which an intruder engages with the targeted system to gather information about vulnerabilities.

The attacker first discovers any vulnerable ports by using software’s like port scanning. After a port scan, an attacker usually exploits known vulnerabilities of services associated with open ports that were detected.

To prevent most port scan attacks or reconnaissance attacks is to use a good firewall and intrusion prevention system (IPS). The firewall controls which ports are exposed and to whom they are visible. The IPS can detect port scans in progress and shut them down before the attacker can gain a full map of your network

Deleted user
by Deleted user

The term reconnaissance refers to the first preattack phase of the hacking process: it involves information-gathering behaviors that aim to profile the target organization or network for the efficient attack tactics. Reconnaissance can be classified into five types.

The reconnaissance target range may include the target organization's clients, employees, operations, network and systems.

TYPES OF RECONNAISSANCE ATTACKS

  • Social Engineering;
  • Site (Physical) Reconnaissance;
  • Internet Reconnaissance;
  • IP/Network Reconnaissance;
  • DNS Reconnaissance.

 

Deleted user
by Deleted user

Reconnaissance is a kind of attack in which attacker gather the information about the targeted PC and in most cases, precedes an actual access or DoS attack. The intruder queries the alive IP in the network and then for the ports to determine the type and version of the application and operating system running on the target host.  

We can prevent this attack by configuring intrusion prevention system in the network. Though the security administrator still needs conduct the penetration testing on the regular interval to avoid such kind of situations.

 

Hope you find this helpful.

 

Thanks.

 

More Questions Like This