Cyber security Kill Chain: Active Reconnaissance Overview, Methodology and Tools
Reconnaissance is the first in the cyber security kill chain and it involved both passive and active techniques to obtain information about a target. Once an attacker has used Opensource Intelligence (OSINT) for passive reconnaissance, they generally move on to active techniques of information gathering that involve direct interaction with a target. In this video, we’ll discuss active the active reconnaissance methodology and review tools and techniques for gathering information we can use for the next step in the kill chain.
Active Reconnaissance Overview, Methodology and Procedures 0:47
DNS Enumeration (dnsrecon & dnsenum) 1:47
SMTP Enumeration (netcat, snip-enum, swaks) 2:54
nMap Port Scanning Using Decoys 3:43
nMap Scripting Engine (NSE) 5:49
Views : 5452
cyber security
Source by The CISO Perspective