Reconnaissance in Ethical Hacking

What is Reconnaissance?

Reconnaissance, also known as Information Gathering or Footprinting, is the first phase of ethical hacking. It involves collecting as much information as possible about a target system, network, or organization before launching an actual attack.

Types of Reconnaissance

1. Passive Reconnaissance

2. Active Reconnaissance

Key Reconnaissance Objectives

Common Reconnaissance Tools

Tool Use
whois Get domain ownership and registrar info
nslookup / dig DNS info and zone transfers
Nmap Port scanning, OS & service detection
theHarvester Harvest emails and hosts
Shodan Find exposed devices on the internet
Recon-ng Recon automation framework
Maltego Visual link analysis & relationship mapping
Google Dorks Advanced Google queries to find sensitive data

Real-World Footprinting Techniques

DNS Footprinting

Employee Footprinting

Metadata Analysis

Company Tech Stack Discovery

Hidden Recon Tip No One Tells You

Type of Risk Description

Type of Risk Description
Detection Active recon (e.g., Nmap, ping sweeps) can trigger firewalls or IDS/IPS.
IP Blocking Suspicious scanning may lead to your IP getting blacklisted.
Legal Violation Performing recon on unauthorized systems can be illegal and lead to prosecution.
Honeypots Interacting with intentionally vulnerable systems can expose you as an intruder.
Incomplete Info Misinterpreting data can lead to wrong assumptions and failed exploits.
Legal Warning: Reconnaissance should only be performed on systems you have permission to test. Doing otherwise may be illegal and result in criminal charges.

Summary Checklist

Passive Recon:

Active Recon:

Tools Mastery: