mirror of
https://github.com/UberGuidoZ/Flipper.git
synced 2024-12-22 22:40:14 +00:00
80 lines
4.7 KiB
Markdown
80 lines
4.7 KiB
Markdown
|
<!DOCTYPE html>
|
||
|
<html lang="en">
|
||
|
<head>
|
||
|
<head>
|
||
|
<meta name="viewport" content="width=device-width, initial-scale=1">
|
||
|
<meta name="description" content="BadUSB scripts exclusively designed for Mac OS & the Flipper Zero device.">
|
||
|
<meta name="author" content="NarstyBits flipperzero badusb payloads">
|
||
|
<!-- Open Graph tags -->
|
||
|
<meta property="og:title" content="MacOS-DuckyScripts">
|
||
|
<meta property="og:description" content="The Recon Folder is dedicated to the topic of Reconnaissance in cybersecurity. It provides information, resources, and tools related to various aspects of Reconnaissance">
|
||
|
<meta property="og:image" content="https://imgur.com/MuZDdAV.png">
|
||
|
<meta property="og:url" content="https://github.com/narstybits/MacOS-DuckyScripts/blob/main/RECON%20Readme.md">
|
||
|
<meta charset="utf-8">
|
||
|
</head>
|
||
|
<body>
|
||
|
|
||
|
[![Image Description](https://imgur.com/MuZDdAV.png)](https://github.com/narstybits/MacOS-DuckyScripts/tree/main/RECON)
|
||
|
|
||
|
<div align="left">
|
||
|
<img alt="Coding" width="1473" height="18" src="https://media.giphy.com/media/9JxkPTP3alOykb8PmQ/giphy.gif">
|
||
|
</div>
|
||
|
|
||
|
<h3 align="center">
|
||
|
<p>Welcome to the Recon Folder!</p>
|
||
|
|
||
|
<h>The <a href="https://github.com/narstybits/MacOS-DuckyScripts/tree/main/RECON">Recon Folder</a> is dedicated to the topic of Reconnaissance in cybersecurity. It provides information, resources, and tools related to various aspects of Reconnaissance.</p>
|
||
|
</h4>
|
||
|
|
||
|
<h2> Introduction
|
||
|
<div align="center">
|
||
|
<img alt="Coding" width="1473" height="5" src="https://media.giphy.com/media/RH27Uw1IFGfIs/giphy.gif">
|
||
|
</div>
|
||
|
<h4>Reconnaissance is the process of gathering information and intelligence about a target, typically used in cybersecurity to assess vulnerabilities and plan targeted attacks. This repository aims to educate and provide resources about the different aspects of Reconnaissance.</p>
|
||
|
|
||
|
<h2> Types of Reconnaissance
|
||
|
<div align="center">
|
||
|
<img alt="Coding" width="1473" height="5" src="https://media.giphy.com/media/RH27Uw1IFGfIs/giphy.gif">
|
||
|
</div>
|
||
|
<h4>
|
||
|
<ol>
|
||
|
<p><span style="font-size: 0;"></span>🔹 Passive Reconnaissance: This involves gathering information without directly interacting with the target. It includes techniques like open-source intelligence (OSINT) gathering, analyzing publicly available information, and searching for vulnerabilities.</li>
|
||
|
<p><span style="font-size: 0;"></span>🔹 Active Reconnaissance: In this phase, an attacker engages with the target system to gather information actively. It may include techniques like port scanning, vulnerability scanning, and network mapping.</li>
|
||
|
<p><span style="font-size: 0;"></span>🔹 Social Engineering: Reconnaissance can also involve social engineering techniques to gather information from individuals or organizations. This includes methods like phishing, pretexting, and impersonation.</li>
|
||
|
</ol>
|
||
|
</h4>
|
||
|
|
||
|
<h2>Tools
|
||
|
<div align="center">
|
||
|
<img alt="Coding" width="1473" height="5" src="https://media.giphy.com/media/RH27Uw1IFGfIs/giphy.gif">
|
||
|
</div>
|
||
|
<h4>
|
||
|
<ul>
|
||
|
<p><span style="font-size: 0;"></span>🔹<a href="https://nmap.org/">Nmap</a>: A powerful network scanning tool used for port scanning and network mapping.</li>
|
||
|
<p><span style="font-size: 0;"></span>🔹<a href="https://www.wireshark.org/">Wireshark</a>: A network protocol analyzer for capturing and analyzing network traffic.</li>
|
||
|
<p><span style="font-size: 0;"></span>🔹<a href="https://cirt.net/Nikto2">Nikto</a>: A web server scanner that performs comprehensive vulnerability assessments.</li>
|
||
|
<p><span style="font-size: 0;"></span>🔹<a href="https://github.com/OJ/gobuster">Gobuster</a>: A tool used for directory and DNS busting during reconnaissance.</li>
|
||
|
</ul>
|
||
|
</h4>
|
||
|
|
||
|
<p>These are just a few examples of tools used in reconnaissance. Remember to always use these tools responsibly and legally, respecting the privacy and security of others.</p>
|
||
|
|
||
|
<h2> Resources
|
||
|
<div align="center">
|
||
|
<img alt="Coding" width="1473" height="5" src="https://media.giphy.com/media/RH27Uw1IFGfIs/giphy.gif">
|
||
|
</div>
|
||
|
<p>Here are some additional resources to learn more about Reconnaissance:</p>
|
||
|
|
||
|
<h4>
|
||
|
<ul>
|
||
|
<p><span style="font-size: 0;"></span>🔹<a href="https://www.amazon.com/Web-Application-Hackers-Handbook-Exploiting/dp/1118026470">The Web Application Hacker's Handbook</a> by Dafydd Stuttard and Marcus Pinto</li>
|
||
|
<p><span style="font-size: 0;"></span>🔹<a href="https://osintframework.com/">OSINT Framework</a>: A collection of various tools and resources for OSINT.</li>
|
||
|
<p><span style="font-size: 0;"></span>🔹<a href="https://owasp.org/www-project-top-ten/">OWASP Top Ten Project</a>: A list of the top ten most critical web application security risks</li>
|
||
|
</ul>
|
||
|
</h4>
|
||
|
|
||
|
<div align="center">
|
||
|
<img alt="Coding" width="1473" height="10" src="https://media.giphy.com/media/RH27Uw1IFGfIs/giphy.gif">
|
||
|
</div>
|
||
|
</body>
|