From the course: Corporate Reconnaissance with Open-Source Intelligence: Examining the First Phase in the Cyber Kill Chain Framework

Unlock this course with a free trial

Join today to access over 24,900 courses taught by industry experts.

Reconnaissance differences and usage: Part 1, passive recon

Reconnaissance differences and usage: Part 1, passive recon

- Now I would like to show you and explain the key characteristics of active and passive reconnaissance from a cybersecurity perspective, as well as their differences so you can understand the techniques used in both methods, but also for you to be able to determine the appropriate scenarios to apply each type during a cybersecurity operation. Let's start with passive reconnaissance. This method involves gathering information about a target without directly interacting with it. The goal here is to remain undetected, quietly collecting data from publicly available sources or via third parties. Some common techniques used in passive reconnaissance include reviewing public websites, checking domain registration records, analyzing social media posts, and performing DNS lookups. Since the attacker isn't interacting directly with the target, this method is less likely to raise any alarms. Let's get practical. When you use the Google search engine, what exactly are you using for your search…

Contents