Which of the following best describes passive reconnaissance in cybersecurity?
Think about methods that do not alert the target or involve direct contact.
Passive reconnaissance involves collecting information without direct interaction, such as searching public records or social media. Active methods involve direct scanning or probing.
Which tool is commonly used for active network reconnaissance to discover open ports and services?
This tool sends packets to target systems to identify open ports.
Nmap is a popular active scanning tool used to find open ports and services on a network. Wireshark captures network traffic, Maltego is for link analysis, and Shodan is a search engine for internet-connected devices.
Given the following scenario, which reconnaissance technique is being used?
A hacker collects employee names and emails from a company's public website and social media profiles without sending any network requests to the company's servers.
Consider if the hacker interacts directly with the company's systems.
The hacker is gathering information from publicly available sources without direct interaction with the company's systems, which is passive reconnaissance.
Which DNS enumeration method involves querying DNS servers to find subdomains and related information?
This method tries to get a full copy of DNS records from a server.
Zone transfer is a DNS enumeration technique where an attacker requests a copy of the DNS zone file to learn about subdomains. Port scanning checks open ports, packet sniffing captures network traffic, and phishing tricks users.
Why is reconnaissance considered a critical phase in a cyber attack?
Think about the purpose of collecting information before attacking.
Reconnaissance helps attackers understand the target's environment, which is essential for planning successful attacks. It does not directly exploit or install malware but gathers data to do so later.