2
Ethical Hacking Footprinting and Reconnaissance
Hacking computer networks and systems does not start with a click of a mouse in an application to gain access to a target. Although this can occur, it tends to be more opportunistic and not part of a well-thought-out plan. Each phase of the journey uncovers useful information that the attacker can use to not only break in but to stay hidden. But to get there, they need information.
This is where the first phase of most attacks begins, with information gathering and intelligence, often called footprinting. In this stage, we passively gain information about a target. What that means is we gather information without the knowledge of the target. This is done primarily through what is called Open ...
Get Hands-On Ethical Hacking Tactics now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.