👣Overview
This is about learning as much about your target as possible
Overview
Learning as much about the target as possible. This can take weeks or even months.
Information is found everywhere such as websites, directories, email addresses, job sites, and social networks.
The key is to narrow the scope so the recon is more focused.
Before beginning, think about who is the target, where is the target, what is the target, when to attack, and how to attack.
Competitive Intelligence
Learn about its competitors to make better business decisions
Helps to face business challenges with more direction
Find out what software they are using in the job descriptions and then look for vulnerabilities.
You can find this using CVE Details website
You could even locate the business on Google Earth or Streetview so you can hack into their wireless network.
Ethical Hacking
Uses the same methods as Competitive intelligence
Fact-finding using publicly available resources
Last updated