{"title":"侦察攻击常用工具和技术综述法庭程序","authors":"Odun-Ayo Isaac Gabriel","doi":"10.22624/aims/isteams-2021/v28p11","DOIUrl":null,"url":null,"abstract":"Background: A reconnaissance helps the attacker gain valuable information on the target to help the attacker select the best tools that would make the attack successful. Aim: This study aims to review tools for reconnaissance attacks which will be beneficial to professional ethical hackers and also enlighten organizations and the general public of the potential harm of successful reconnaissance attacks. Methodology: The databases – Springer, Elsevier, Wiley, IEEE, ACM, ArXiv, and Google Scholar were explored. A quantitative evaluation was conducted on 19 selected articles. Result: 95.2% of the reconnaissance tools allowed experts to gather information by use of the command line. While 4.8% of the tools do not provide a commandline interface. 61.9% of the tools are network-based – can be used to gather data about the target’s network infrastructure. Conclusion: The best-fit tool is massively dependent on the attacker or penetration tester. Therefore, a tool should be selected based on the user’s preference and the attack style. Keywords: Reconnaissance, cyber-attack, cybersecurity,social engineering, techniques.","PeriodicalId":332710,"journal":{"name":"Proceedings of the 28th iSTEAMS Multidisciplinary & Inter-tertiary Research Conference","volume":"205 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Review of Common Tools and Techniques for Reconnaissance Attacks.. Proceedings of the\",\"authors\":\"Odun-Ayo Isaac Gabriel\",\"doi\":\"10.22624/aims/isteams-2021/v28p11\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Background: A reconnaissance helps the attacker gain valuable information on the target to help the attacker select the best tools that would make the attack successful. Aim: This study aims to review tools for reconnaissance attacks which will be beneficial to professional ethical hackers and also enlighten organizations and the general public of the potential harm of successful reconnaissance attacks. Methodology: The databases – Springer, Elsevier, Wiley, IEEE, ACM, ArXiv, and Google Scholar were explored. A quantitative evaluation was conducted on 19 selected articles. Result: 95.2% of the reconnaissance tools allowed experts to gather information by use of the command line. While 4.8% of the tools do not provide a commandline interface. 61.9% of the tools are network-based – can be used to gather data about the target’s network infrastructure. Conclusion: The best-fit tool is massively dependent on the attacker or penetration tester. Therefore, a tool should be selected based on the user’s preference and the attack style. Keywords: Reconnaissance, cyber-attack, cybersecurity,social engineering, techniques.\",\"PeriodicalId\":332710,\"journal\":{\"name\":\"Proceedings of the 28th iSTEAMS Multidisciplinary & Inter-tertiary Research Conference\",\"volume\":\"205 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-10-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 28th iSTEAMS Multidisciplinary & Inter-tertiary Research Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.22624/aims/isteams-2021/v28p11\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 28th iSTEAMS Multidisciplinary & Inter-tertiary Research Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.22624/aims/isteams-2021/v28p11","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Review of Common Tools and Techniques for Reconnaissance Attacks.. Proceedings of the
Background: A reconnaissance helps the attacker gain valuable information on the target to help the attacker select the best tools that would make the attack successful. Aim: This study aims to review tools for reconnaissance attacks which will be beneficial to professional ethical hackers and also enlighten organizations and the general public of the potential harm of successful reconnaissance attacks. Methodology: The databases – Springer, Elsevier, Wiley, IEEE, ACM, ArXiv, and Google Scholar were explored. A quantitative evaluation was conducted on 19 selected articles. Result: 95.2% of the reconnaissance tools allowed experts to gather information by use of the command line. While 4.8% of the tools do not provide a commandline interface. 61.9% of the tools are network-based – can be used to gather data about the target’s network infrastructure. Conclusion: The best-fit tool is massively dependent on the attacker or penetration tester. Therefore, a tool should be selected based on the user’s preference and the attack style. Keywords: Reconnaissance, cyber-attack, cybersecurity,social engineering, techniques.