Passive & Active Reconnaissance

  • Home
  • Passive & Active Reconnaissance

In passive Recon, Pentest team attempt to gather information from sources of Open Source Intelligence like paste sites, leaked password repositories etc. — to gather information about the employees and the organization. In active Recon, pentester characterize the target systems and network — to identify potentially exploitable vulnerabilities or misconfigurations

Related Posts

Red Teaming (RT)

Unlike VAPT’s breadth intensive activities in vulnerability identification, our red teaming service is a depth

Read More

Web/Mobile application Pentest

Web and Mobile applications are tested for exploitable vulnerabilities identifications and business logic flows. Please

Read More

Privilege Escalation & Lateral Movement

Pentest team attempt to gain administrator-level access to target systems and leverage collected data to

Read More