In ethical hacking, the first, most important step is gathering information regarding your target. Reconnaissance contains the techniques and methodology necessary to gather information about your target system secretly.
Reconnaissance succeeds in two parts: active reconnaissance and passive reconnaissance.
Active reconnaissance is the process of collecting or retrieving information in a way where target systems can view your actions. It should be done by taking permission. Otherwise, the victim could take severe actions against the hacker. This type of reconnaissance gathers information by interacting directly, so it helps to collect more useful data by notifying the owner about your activities. One example would be researching through the internet.
In the passive reconnaissance process, information is gathered without interacting with the victim. It is an indirect approach to connect with your target. Passive reconnaissance is always dependant upon the visibly available data. You can use this technique for gathering information about any company’s technology or employees. Common methods that are included in this technique are as follows:
One example of this would be retrieving information of any target network through port scanning.
Some important steps must be followed by ethical hackers during reconnaissance. Let’s discuss these steps: