Cyber security Kill Chain: Active Reconnaissance Overview, Methodology and Tools
The CISO Perspective The CISO Perspective
30.5K subscribers
7,894 views
0

 Published On Premiered Nov 8, 2020

Reconnaissance is the first in the cyber security kill chain and it involved both passive and active techniques to obtain information about a target. Once an attacker has used Opensource Intelligence (OSINT) for passive reconnaissance, they generally move on to active techniques of information gathering that involve direct interaction with a target. In this video, we'll discuss active the active reconnaissance methodology and review tools and techniques for gathering information we can use for the next step in the kill chain.


Active Reconnaissance Overview, Methodology and Procedures 0:47
DNS Enumeration (dnsrecon & dnsenum) 1:47
SMTP Enumeration (netcat, snip-enum, swaks) 2:54
nMap Port Scanning Using Decoys 3:43
nMap Scripting Engine (NSE) 5:49

show more

Share/Embed