Passive Reconnaissance
a) What is passive reconnaissance?
b) Why do hackers use passive reconnaissance?
c) Can organizations prevent passive reconnaissance? Why/How?
d) What are some of the search operators you can use in a Google search to query results from
specific domains, Web sites, or links?
e) What would be the Google search syntax to search the site exploit-db.com for Firefox exploits?
f) When using theHarvester, what are command switches -d and -b used for?
g) In the lab you used Maltego to graphically display what information?
h) If, while viewing LinkedIn profiles, you notice that a person’s name is shown as “LinkedIn
Member,” how might you be able to view their full name?
i) How does this topic of passive reconnaissance and your understanding of satan’s attacks relate
to your Biblical worldview?
Last Completed Projects
topic title | academic level | Writer | delivered |
---|