Reconnaissance is the first in the cyber security kill-chain and it involved both passive and active techniques to obtain information about a target. Once an attacker has used Opensource Intelligence (OSINT) for passive reconnaissance, they generally move on to active techniques of information gathering that involve direct interaction with a target. In this video, we'll discuss active the active reconnaissance methodology and review tools and techniques for gathering information we can use for the next step in the kill-chain. Active Reconnaissance Overview, Methodology and Procedures 0:47 DNS Enumeration (dnsrecon & dnsenum) 1:47 SMTP Enumeration (netcat, snip-enum, swaks) 2:54 nMap Port Scanning Using Decoys 3:43 nMap Scripting Engine (NSE) 5:49 👇 More Info 👇 Animations by TCP Media: Viral content. Tech-first thinking. White-glove service. 🎯 Need content like this? Visit for high-impact technical marketing.











