β³οΈ Reconnaissance β³οΈ
πThis is the first step of Hacking. It is also called as Footprinting and information gathering Phase. This is the preparatory phase where we collect as much information as possible about the target. We usually collect information about three groups,
1.Network
2.Host
3.People involved
πThere are two types of Footprinting:
π’Active: Directly interacting with the target to gather information about the target. Eg: Using Nmap tool to scan the target
π’Passive: Trying to collect the information about the target without directly accessing the target.
This involves collecting information from social media, public websites etc.
πThis is the first step of Hacking. It is also called as Footprinting and information gathering Phase. This is the preparatory phase where we collect as much information as possible about the target. We usually collect information about three groups,
1.Network
2.Host
3.People involved
πThere are two types of Footprinting:
π’Active: Directly interacting with the target to gather information about the target. Eg: Using Nmap tool to scan the target
π’Passive: Trying to collect the information about the target without directly accessing the target.
This involves collecting information from social media, public websites etc.