Ethical Hacking 简明教程
Ethical Hacking - Reconnaissance
信息收集和了解目标系统是道德黑客攻击中的第一个过程。侦查是一组用来秘密发现和收集有关目标系统信息的流程和技术(足迹、扫描和枚举)。
Information Gathering and getting to know the target systems is the first process in ethical hacking. Reconnaissance is a set of processes and techniques (Footprinting, Scanning & Enumeration) used to covertly discover and collect information about a target system.
在侦查期间,道德黑客试图收集尽可能多的有关目标系统的信息,按照下面列出的七个步骤执行 −
During reconnaissance, an ethical hacker attempts to gather as much information about a target system as possible, following the seven steps listed below −
-
Gather initial information
-
Determine the network range
-
Identify active machines
-
Discover open ports and access points
-
Fingerprint the operating system
-
Uncover services on ports
-
Map the network
我们将在本教程的后续章节中详细讨论所有这些步骤。侦查分为两部分 − Active Reconnaissance 和 Passive Reconnaissance 。
We will discuss in detail all these steps in the subsequent chapters of this tutorial. Reconnaissance takes place in two parts − Active Reconnaissance and Passive Reconnaissance.
Active Reconnaissance
在该过程中,您将直接与计算机系统进行交互以获取信息。这些信息可能相关且准确。但如果您计划在未经允许的情况下进行主动侦察,则存在被检测到的风险。如果您被检测到,那么系统管理员可以对您采取严厉行动并追踪您后续的活动。
In this process, you will directly interact with the computer system to gain information. This information can be relevant and accurate. But there is a risk of getting detected if you are planning active reconnaissance without permission. If you are detected, then system admin can take severe action against you and trail your subsequent activities.