In the context of cybersecurity, reconnaissance is the practice of covertly discovering and collecting information about a system. This method is often used in ethical hacking or penetration testing.
1.Collect initial information
2.Determine the network range
3.Identify active machines
4.Find access points and open ports
5.Fingerprint the operating system
6.Discover services on ports
7.Map the network
1.Active Reconnaissance:
-With active reconnaissance, hackers interact directly with the computer system and attempt to obtain information.
2.Passive Reconnaissance:
-Passive reconnaissance gathers information without directly interacting with systems.
1.Google
2.Shodan
3.Github
Google Dorking Payload
Shodan Dorking Payload
GitHub Dorking Payload
https://hackerone.com/reports/397527
https://hackerone.com/reports/493176
https://hackerone.com/reports/502758
https://github.com/TUXCMD/Google-Dorks-Full_list/blob/master/googledorks_full.txt
https://shahjerry33.medium.com/github-recon-its-really-deep-6553d6dfbb1f
https://github.com/lothos612/shodan/blob/main/Shodan%20Dorks.jex