What is reconnaissance in penetration testing? - CYBRI

What is reconnaissance in penetration testing?

|

BY Paul Kubler

Reconnaissance is the act of discovery and utilizing information to achieve that. Pen testing starts with this phase in order to better understand the target. It is an important step that cannot be skipped no matter the process. 

Recon can be passive or active, and often both are used depending on the type of engagement. 

Recon’s goal is to gain all the information that can be gathered on a target without attacking it.

Types of reconnaissance attacks

Reconnaissance attacks are classified into two types: active and passive. 

  • Passive is any information that can be gathered without touching the target in any meaningful way. 

This can include GoogleFu/Google Hacking, DNS research, LinkedIn profile gathering, and other ways to get data on the target via third parties. 

  • Active attacks are more directly touching the target but much lighter than an attack phase. 

This recon is based on light probing that creates no direct changes but may be detected in the logs. This can include port scanning, email address validation, and service version confirmation.

Reconnaissance phase of an attack

These two types of recon are combined into a single phase. 

This phase of the pen test makes up the start of each test that cannot be skipped. Skipping this phase usually leads to a test that misses parts of the targets. 

The goal is to gather as much information as possible without alerting the target company to the recon. 

This can be louder in a pen test, where the phase will not get shut down, or silent in a red team, where the goal is stealth.

Reconnaissance techniques

Reconnaissance techniques involve stealthy probing and leveraging third parties as much as possible. 

Any company’s social media accounts and search engine data is fair game for recon. 

The active recon needs to be as silent as possible, port scanning is often easy enough as any publicly facing device is scanned by random devices at all times. 

More directed and less random techniques are more likely to alert the customer.

Discuss your project now

Related Content

Previous
Next

Schedule a personalized demo with CYBRI.

Don't wait, reputation damages & data breaches could be costly.

Tell us a little about your company so we can ensure your demo is as relevant as possible. We’ll take the scheduling from there!
Michael B.
Michael B.Managing Partner, Barasch & McGarry
Read More
I am an attorney who represents thousands of people in the 9/11 community. CYBRI helped my company resolve several cybersecurity issues. I definitely recommend working with CYBRI.
Tim O.
Tim O.CEO at Cylera
Read More
I’m using CYBRI and have been very impressed with the experience and quality of the experts and CYBRI’s customer service. It has been a super seamless process that I’m happy and pleased with – I recommend CYBRI to all businesses.
Sergio V.
Sergio V.CTO at HealthCare.com
Read More
I hired CYBRI to help my company with various cybersecurity services, specifically HIPAA and CCPA. I have been satisfied with the quality of work performed by the cybersecurity expert. The customer service is excellent. I would recommend CYBRI for all of your cybersecurity needs.
L.D. Salmanson
L.D. SalmansonCEO at Cherre.com
Read More
We worked with CYBRI on assessing vulnerabilities and understanding the risks of our client-facing web assets. We are satisfied with the results and the professionalism of the Red Team members. Highly recommend CYBRI to all businesses.
Marco Huslmann
Marco HuslmannCTO MyPostcard
Read More
CYBRI is a great solution that helps streamline the penetration testing process. I strongly recommend them and will work with them again.
Alex Rothberg
Alex RothbergCTO IntusCare
Read More
I highly recommend CBYRI to businesses that need penetration testing to ensure their business infrastructure is secure.
John Tambuting
John TambutingCTO Pangea.app
Read More
I am confident CYBRI is the right penetration testing choice if you are looking to build a secure business environment.
Previous
Next

Discuss your Project







    Michael B.
    Michael B.Managing Partner, Barasch & McGarry
    Read More
    I am an attorney who represents thousands of people in the 9/11 community. CYBRI helped my company resolve several cybersecurity issues. I definitely recommend working with CYBRI.
    Tim O.
    Tim O.CEO at Cylera
    Read More
    I’m using CYBRI and have been very impressed with the experience and quality of the experts and CYBRI’s customer service. It has been a super seamless process that I’m happy and pleased with – I recommend CYBRI to all businesses.
    Sergio V.
    Sergio V.CTO at HealthCare.com
    Read More
    I hired CYBRI to help my company with various cybersecurity services, specifically HIPAA and CCPA. I have been satisfied with the quality of work performed by the cybersecurity expert. The customer service is excellent. I would recommend CYBRI for all of your cybersecurity needs.
    L.D. Salmanson
    L.D. SalmansonCEO at Cherre.com
    Read More
    We worked with CYBRI on assessing vulnerabilities and understanding the risks of our client-facing web assets. We are satisfied with the results and the professionalism of the Red Team members. Highly recommend CYBRI to all businesses.
    Marco Huslmann
    Marco HuslmannCTO MyPostcard
    Read More
    CYBRI is a great solution that helps streamline the penetration testing process. I strongly recommend them and will work with them again.
    Alex Rothberg
    Alex RothbergCTO IntusCare
    Read More
    I highly recommend CBYRI to businesses that need penetration testing to ensure their business infrastructure is secure.
    John Tambuting
    John TambutingCTO Pangea.app
    Read More
    I am confident CYBRI is the right penetration testing choice if you are looking to build a secure business environment.
    Previous
    Next

    Find mission-critical vulnerabilities before hackers do.

    CYBRI’s manual pen tests are performed by U.S.-based highly certified Red Team experts.

    We help businesses detect & remediate catastrophic vulnerabilities in applications, cloud, and networks.