Ethical Hacking 简明教程

Ethical Hacking - Reconnaissance

信息收集和了解目标系统是道德黑客攻击中的第一个过程。侦查是一组用来秘密发现和收集有关目标系统信息的流程和技术(足迹、扫描和枚举)。

Information Gathering and getting to know the target systems is the first process in ethical hacking. Reconnaissance is a set of processes and techniques (Footprinting, Scanning & Enumeration) used to covertly discover and collect information about a target system.

在侦查期间,道德黑客试图收集尽可能多的有关目标系统的信息,按照下面列出的七个步骤执行 −

During reconnaissance, an ethical hacker attempts to gather as much information about a target system as possible, following the seven steps listed below −

  1. Gather initial information

  2. Determine the network range

  3. Identify active machines

  4. Discover open ports and access points

  5. Fingerprint the operating system

  6. Uncover services on ports

  7. Map the network

我们将在本教程的后续章节中详细讨论所有这些步骤。侦查分为两部分 − Active ReconnaissancePassive Reconnaissance

We will discuss in detail all these steps in the subsequent chapters of this tutorial. Reconnaissance takes place in two parts − Active Reconnaissance and Passive Reconnaissance.

Active Reconnaissance

在该过程中,您将直接与计算机系统进行交互以获取信息。这些信息可能相关且准确。但如果您计划在未经允许的情况下进行主动侦察,则存在被检测到的风险。如果您被检测到,那么系统管理员可以对您采取严厉行动并追踪您后续的活动。

In this process, you will directly interact with the computer system to gain information. This information can be relevant and accurate. But there is a risk of getting detected if you are planning active reconnaissance without permission. If you are detected, then system admin can take severe action against you and trail your subsequent activities.

Passive Reconnaissance

在该过程中,您将不会直接连接到计算机系统。这个过程用于收集必要信息,而无需与目标系统进行任何交互。

In this process, you will not be directly connected to a computer system. This process is used to gather essential information without ever interacting with the target systems.