PASSIVE Vs ACTIVE INFORMATION GATHERING FOR WEBSITE RELIABILITY
Information Gathering is the First Step of Ethical Hacking.
Penetration Tester or even Hackers Gather Information on their target victims.
Every Attack Begins with Information Gathering.
There are two types of Information Gathering that anyone can perform:
- Active Information Gathering
- Passive Information Gathering
Passive Information Gathering
Passive Information Gathering is when anyone gather information about a target without directly interacting with the target.
This means that anyone do not send any type of request to the target and therefore the target has no way of knowing that anyone is gathering information on them.
Generally passive information gathering uses public resources that have information on that target. Using public resources to gather information is called Open source intelligence (OSINT).
Using OSINT anyone can gather things such as:
- Victim IP addresses
- Domain Name Information
- Technologies used by the website/web applications
- Other websites on the same server
- DNS records
- Unlisted files, subdomains and directories
Active Information Gathering
Active Information Gathering is when anyone interact directly with a computer system in order to gather system specific information about the target.
Active Information Gathering relies on tools that will send different types of requests to the computer.
The goal is to gather information about that device or other devices that are connected to it on the same network.
Active Information Gathering can be used to find out information such as:
- Open/Closed Ports
- OS of a Machine
- Services that are Running
- Banner Grabbing
- Discovering New Hosts
- Vulnerable Applications on a Host
- Intrusion Detection Systems (IDS): analyze and monitor network traffic for signs that indicate attackers are using a known cyberthreat to infiltrate or steal data from your network. IDS systems compare the current network activity to a known threat database to detect several kinds of behaviors like security policy violations, malware, and port scanners.
- Intrusion Prevention Systems (IPS): live in the same area of the network as a firewall, between the outside world and the internal network. IPS proactively deny network traffic based on a security profile if that packet represents a known security threat.
https://whois.domaintools.com
https://host.io/
https://ipinfo.io/
https://www.netcraft.com
https://www.robtex.com/
https://bing.com
ip: xxxxxxxxxxx
https://www.google.com
site:
inurl:
intext:
intext:
filetype:
https://www.ipvoid.com
http://www.webportscanner.com
https://nmap.online
https://www.similarweb.com
- Get link
- X
- Other Apps
Comments
Post a Comment