Posts

Showing posts with the label active-information-gathering

DASHBOARDS AND REPORTS

Image
  a { text-decoration: none; color: black; } DASHBOARDS AND REPORTS REGIONAL SALES REPORT PRODUCT WISE SALES REPORT SALES NEXUS REPORT SALES ANALYSIS ADVANCE KPI SUPPLY CHAIN REPORT PASSENGER SATISFACTION DASHBOARD EU TRADE GOODS DASHBOARD DEMOGRAPHY DASHBOARD PHARMA ANALYTICS AEROSPACE ANALYTICS DRUG MANUFACTURER STOC HISTORICAL ANALYSIS REPORT BANK RISK ANALYSIS REPORT OIL & GAS STOCK HISTORICAL ANALYSIS REPORT

PASSIVE Vs ACTIVE INFORMATION GATHERING FOR WEBSITE RELIABILITY

Image
  Information Gathering is the First Step of Ethical Hacking. Penetration Tester or even Hackers Gather Information on their target victims.  Every Attack Begins with Information Gathering. There are two types of Information Gathering that anyone can perform: Active Information Gathering Passive Information Gathering Passive Information Gathering Passive Information Gathering is when anyone gather information about a target without directly interacting with the target.  This means that anyone do not send any type of request to the target and therefore the target has no way of knowing that anyone is gathering information on them.  Generally passive information gathering uses public resources that have information on that target. Using public resources to gather information is called Open source intelligence (OSINT).  Using OSINT anyone can gather things such as: Victim IP addresses Domain Name Information Technologies used by the website/web applications Other we...