Hacking Process - Recon
Hacking Process - Recon
Reviewed by Anonymous
on
February 10, 2018
Rating:
Recon:
The first step of any good compromise or infiltration is learning about the target. Paraphrasing a common saying, "If I was given 5 minutes to chop down a tree, I'd spend 2.5 minutes sharpening my ax". The Recon phase is how we sharpen our axes, allowing us to focus in on what is important.
Whether it's a CTF, War Game, Bug Bounty, or Penetration Test, things tend to go smoother and faster when we follow a process. In this series we'll be going over the major phases of compromising a system and discussing common tools and techniques found in those phases.
Copyright © Hacking & PenTest Videos
Back To Top