Methodology Used in Reconnaissance
The methodology serves as a roadmap for the penetration testing process. The methodology can be different for individual testers. It depends upon the understanding and the scope of the target. A step-wise methodology is essential for less confusion and efficient results.
3klCon – Automation Recon Tool for Small & Medium Scopes
Reconnaissance or Information Gathering is the initial step or the starting step of the Ethical Hacking or Penetration Testing process. Knowing about the target is very important while performing penetration testing. The information about the target collected serves as the milestone while penetrating the target. Targets can be of two types 1) Organization 2) Individual, so as per the target, penetration tester should collect essential information like open ports, IP addresses, MAC Addresses, Whois Records, etc., while Social Media Account Information, Personal Details if the target is an individual.
While penetrating web-based applications, every tester should collect subdomains, service info, Web database info, information exposure, hidden directories and parameters, juicy links, which may be vulnerable.
Contact Us