Recon Basics for Beginners: A Simple Guide
文章介绍了渗透测试中的信息收集阶段(Reconnaissance),分为被动和主动两种方式。被动 Recon 无需与目标互动,通过公开资源获取信息;主动 Recon 则直接与目标互动以获取更多细节。这一阶段是渗透测试的基础,帮助攻击者了解目标结构和潜在漏洞。 2025-7-1 12:1:5 Author: infosecwriteups.com(查看原文) 阅读量:22 收藏

Satyam Pathania

I am not an active bug bounty hunter but when i was in the field the most basic approach how i get started was this .

If you’re just starting out in ethical hacking or bug bounty hunting, the first thing you should learn is Reconnaissance, or simply Recon. Think of recon as the “stalking” phase — but legal and with computers. You gather as much info as you can before trying to break anything.

This guide will explain recon in super basic terms. No fancy words, no hacker lingo. Just beginner-friendly steps with a pinch of humor

Recon is like researching your target. Just like before going on a date, you check their Instagram, LinkedIn, and maybe their dog’s name — here, you do the same but with websites.

There are two types of recon:

  • Passive Recon: You act like a ninja. No interaction with the target. (No one knows you’re spying.)
  • Active Recon: You start poking the target gently. Like knocking on someone’s door just to see who’s home.

Websites don’t live alone. They have roommates — called subdomains. Like:

  • login.example.com

文章来源: https://infosecwriteups.com/recon-basics-for-beginners-a-simple-guide-e76885cdd333?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh