Skip to content

In the context of cybersecurity, reconnaissance is the practice of covertly discovering and collecting information about a system. This method is often used in ethical hacking or penetration testing.

Notifications You must be signed in to change notification settings

illupak/Reconnaissance

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

22 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Reconnaissance

In the context of cybersecurity, reconnaissance is the practice of covertly discovering and collecting information about a system. This method is often used in ethical hacking or penetration testing.

How Reconnaissance Works

1.Collect initial information
2.Determine the network range
3.Identify active machines
4.Find access points and open ports
5.Fingerprint the operating system
6.Discover services on ports
7.Map the network

Types of Reconnaissance

1.Active Reconnaissance:
-With active reconnaissance, hackers interact directly with the computer system and attempt to obtain information.

2.Passive Reconnaissance:
-Passive reconnaissance gathers information without directly interacting with systems.

Top 3 tools used for Passive Reconnaissance

1.Google
2.Shodan
3.Github

Payloads

Google Dorking Payload
Shodan Dorking Payload
GitHub Dorking Payload

Top Findings

https://hackerone.com/reports/397527

https://hackerone.com/reports/493176

https://hackerone.com/reports/502758

References

https://github.com/TUXCMD/Google-Dorks-Full_list/blob/master/googledorks_full.txt

https://shahjerry33.medium.com/github-recon-its-really-deep-6553d6dfbb1f

https://github.com/lothos612/shodan/blob/main/Shodan%20Dorks.jex

About

In the context of cybersecurity, reconnaissance is the practice of covertly discovering and collecting information about a system. This method is often used in ethical hacking or penetration testing.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published