Practical examples of reconnaissance

Threat actors are aware of the amount of personal data floating insecurely in cyberspace, and often are experts in gaining access to that data without raising the suspicions of the service provider or the user. There are many sources, techniques, and tools available to them for performing successful reconnaissance on the individual or organization that they are targeting. The number one rule for threat actors in this phase is that all information can be useful at some point.

Passive information gathering is the technique threat actors use to discover potentially useful information through publicly available sources. This could be the WHOIS information of the company's domains, contact information on the ...

Get Learn Social Engineering now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.