Eth hack week 1 - zacharylongo/Tech-Journals GitHub Wiki
-
The main emphasis for this weeks assignments was on Passive recon and tools associated with it.
-
This week, we used harvester to obtain publicly available information on the target such as relevant links, IP's, email addresses, and related hosts.
-
Passive reconnaissance at its core relies on the principle of obtaining as much information about an organization and its architecture as possible without the need to directly interact with the organizations infrastructure itself.
-
Its important to note that there is a distinction between active and passive scans. Active scans can be intrusive and are commonly detectable by latent systems.