Analyzing Reconnaissance Threats to Computing and Network Environments Flashcards
Reconnaissance Steps
Footprinting, Scanning, Enumeration
Footprinting
First, passive phase in which an attacker gathers general information about a target before an attack
Scanning
Active phase that involves using tools to discover info about hosts and services on a network
Enumeration
Last, active phase where the attacker tries to map the network as a whole to identify potential targets
Recon Evasion Techniques
Obfuscating packet data, fragmenting data into multiple packets, encrypting traffic, DoS the NIDS
Packet Trace Analysis
Traffic analysis where insights are gained from the metadata of captured packets
Social Engineering
Deceiving people into giving away access or confidential information to unauthorized parties