Passive & Active Reconnaissance

  • Home
  • Passive & Active Reconnaissance

In passive Recon, Pentest team attempt to gather information from sources of Open Source Intelligence like paste sites, leaked password repositories etc. — to gather information about the employees and the organization. In active Recon, pentester characterize the target systems and network — to identify potentially exploitable vulnerabilities or misconfigurations

Related Posts

Red Teaming (RT)

Unlike VAPT’s breadth intensive activities in vulnerability identification, our red teaming service is a depth

Read More

Social Engineering Based Testing

End users are the weakest link of cybersecurity control chain. An assessment is conducted to

Read More

Exploitation

Exploitation

Read More