USD ($)
$
United States Dollar
Euro Member Countries
India Rupee
د.إ
United Arab Emirates dirham
ر.س
Saudi Arabia Riyal

Types of Recon (Passive vs Active)

Lesson 13/37 | Study Time: 20 Min

Reconnaissance is a crucial phase in cybersecurity and ethical hacking where an attacker or security professional gathers information about a target system or network. It lays the foundation for planning further actions by building an understanding of the target's characteristics and vulnerabilities.

Reconnaissance can be broadly categorised into two types: passive and active. Each type has distinct methods, advantages, and risks, playing unique roles in security assessments and attacks.

Passive Reconnaissance

Passive reconnaissance involves collecting information about a target without directly interacting with the target system or network. It relies on publicly available data sources such as domain information, public records, social media, search engines, and organizational websites.

Techniques include DNS enumeration, WHOIS database lookups, IP address gathering, and monitoring network traffic from an external viewpoint. Because there is no direct contact with the target, passive reconnaissance is stealthy and difficult for the target to detect.

It provides an initial overview but may yield less current or detailed data compared to active methods. Passive reconnaissance is often the first step in both offensive attacks and defensive security assessments.

Active Reconnaissance

Active reconnaissance requires direct interaction with the target system or network to gather information. This method uses techniques like port scanning, ping sweeps, banner grabbing, vulnerability scanning, and traceroute analysis.

Active reconnaissance provides more detailed, real-time, and accurate data about active hosts, open ports, running services, and potential vulnerabilities. Because it interacts with the target, it is more intrusive and easier for the target's security systems, such as firewalls and intrusion detection systems, to detect.

It carries the risk of alerting the target or even causing disruptions if improperly conducted. It is typically used after passive reconnaissance to validate findings and pinpoint attack vectors.

Comparison of Passive and Active Reconnaissance


Practical Applications


1. Attackers often begin with passive reconnaissance to avoid detection, gathering information quietly before shifting to active reconnaissance for deeper insights.

2. Security professionals use passive reconnaissance to identify publicly exposed assets and active reconnaissance to evaluate the security posture and vulnerabilities with permission.

Risks and Ethical Considerations 

Jake Carter

Jake Carter

Product Designer
5.00
Profile

Class Sessions

1- What is Ethical Hacking? Purpose, Scope & Limitations 2- Types of Hackers 3- Cyber Kill Chain & Basic Attack Lifecycle 4- Legal & Ethical Considerations (Laws, Permissions, Responsible Disclosure) 5- Basics of Networking (IP, MAC, Ports, Protocols) 6- OSI & TCP/IP Models 7- Common Network Devices & Architectures (Routers, Switches, LAN/WAN) 8- Understanding Firewalls, NAT & Basic Packet Flow 9- Operating Systems Overview 10- File Systems, Users, Permissions & Access Controls 11- Introduction to Web Applications (HTTP/HTTPS, Cookies, Sessions) 12- Client vs Server Architecture Basics 13- Types of Recon (Passive vs Active) 14- Footprinting Techniques (DNS lookup, WHOIS, Website & Metadata Analysis) 15- Basic Scanning Tools Overview 16- Identifying Publicly Exposed Information & Attack Surface Basics 17- Vulnerability, Threat, Exploit: Definitions & Differences 18- Common Vulnerabilities: Misconfigurations. Default Credentials, Weak Passwords ,and Unpatched Software 19- Social Engineering Basics 20- Basic Malware Categories 21- Port Scanning Basics (Open/Closed/Filtered Ports) 22- Network Mapping Essentials 23- Service & Version Enumeration Concepts 24- Identifying Common Services (HTTP, FTP, SSH, SMB) 25- Password Security Essentials (Strength, Hashing Concepts, Common Weaknesses) 26- OS Weaknesses 27- Network Weaknesses 28- Basics of Web Vulnerabilities 29- Security Hardening Fundamentals (System, Network, User Practices) 30- Patch Management & Configuration Hygiene 31- Secure Password & Authentication Practices 32- Basic Network Security Controls (Firewalls, IDS/IPS—concept only) 33- Safe Browsing & User Awareness Essentials 34- Documenting Findings 35- Communicating Risks to Non-Technical Stakeholders 36- Responsible Disclosure Process 37- Ethical Hacker Code of Conduct

Sales Campaign

Sales Campaign

We have a sales campaign on our promoted courses and products. You can purchase 1 products at a discounted price up to 15% discount.