4.7 KiB
![Coding](https://media.giphy.com/media/9JxkPTP3alOykb8PmQ/giphy.gif)
Welcome to the Recon Folder!
The Recon Folder is dedicated to the topic of Reconnaissance in cybersecurity. It provides information, resources, and tools related to various aspects of Reconnaissance.
Introduction
![Coding](https://media.giphy.com/media/RH27Uw1IFGfIs/giphy.gif)
Reconnaissance is the process of gathering information and intelligence about a target, typically used in cybersecurity to assess vulnerabilities and plan targeted attacks. This repository aims to educate and provide resources about the different aspects of Reconnaissance.
Types of Reconnaissance
![Coding](https://media.giphy.com/media/RH27Uw1IFGfIs/giphy.gif)
🔹 Passive Reconnaissance: This involves gathering information without directly interacting with the target. It includes techniques like open-source intelligence (OSINT) gathering, analyzing publicly available information, and searching for vulnerabilities.
🔹 Active Reconnaissance: In this phase, an attacker engages with the target system to gather information actively. It may include techniques like port scanning, vulnerability scanning, and network mapping.
🔹 Social Engineering: Reconnaissance can also involve social engineering techniques to gather information from individuals or organizations. This includes methods like phishing, pretexting, and impersonation.
🔹 Passive Reconnaissance: This involves gathering information without directly interacting with the target. It includes techniques like open-source intelligence (OSINT) gathering, analyzing publicly available information, and searching for vulnerabilities.
🔹 Active Reconnaissance: In this phase, an attacker engages with the target system to gather information actively. It may include techniques like port scanning, vulnerability scanning, and network mapping.
🔹 Social Engineering: Reconnaissance can also involve social engineering techniques to gather information from individuals or organizations. This includes methods like phishing, pretexting, and impersonation.
Tools
![Coding](https://media.giphy.com/media/RH27Uw1IFGfIs/giphy.gif)
🔹Nmap: A powerful network scanning tool used for port scanning and network mapping.
🔹Wireshark: A network protocol analyzer for capturing and analyzing network traffic.
🔹Nikto: A web server scanner that performs comprehensive vulnerability assessments.
🔹Gobuster: A tool used for directory and DNS busting during reconnaissance.
🔹Nmap: A powerful network scanning tool used for port scanning and network mapping.
🔹Wireshark: A network protocol analyzer for capturing and analyzing network traffic.
🔹Nikto: A web server scanner that performs comprehensive vulnerability assessments.
🔹Gobuster: A tool used for directory and DNS busting during reconnaissance.
These are just a few examples of tools used in reconnaissance. Remember to always use these tools responsibly and legally, respecting the privacy and security of others.
Resources
![Coding](https://media.giphy.com/media/RH27Uw1IFGfIs/giphy.gif)
Here are some additional resources to learn more about Reconnaissance:
🔹The Web Application Hacker's Handbook by Dafydd Stuttard and Marcus Pinto
🔹OSINT Framework: A collection of various tools and resources for OSINT.
🔹OWASP Top Ten Project: A list of the top ten most critical web application security risks
🔹The Web Application Hacker's Handbook by Dafydd Stuttard and Marcus Pinto
🔹OSINT Framework: A collection of various tools and resources for OSINT.
🔹OWASP Top Ten Project: A list of the top ten most critical web application security risks
![Coding](https://media.giphy.com/media/RH27Uw1IFGfIs/giphy.gif)