BadUSB/MacOS-narstybits/RECON Readme.md
<h>The <a href="https://github.com/narstybits/MacOS-DuckyScripts/tree/main/RECON">Recon Folder</a> is dedicated to the topic of Reconnaissance in cybersecurity. It provides information, resources, and tools related to various aspects of Reconnaissance.</p>
</h4> <h2> Introduction <div align="center"> </div> <h4>Reconnaissance is the process of gathering information and intelligence about a target, typically used in cybersecurity to assess vulnerabilities and plan targeted attacks. This repository aims to educate and provide resources about the different aspects of Reconnaissance.</p> <h2> Types of Reconnaissance <div align="center"> </div> <h4> <ol> <p><span style="font-size: 0;"></span>🔹 Passive Reconnaissance: This involves gathering information without directly interacting with the target. It includes techniques like open-source intelligence (OSINT) gathering, analyzing publicly available information, and searching for vulnerabilities.</li> <p><span style="font-size: 0;"></span>🔹 Active Reconnaissance: In this phase, an attacker engages with the target system to gather information actively. It may include techniques like port scanning, vulnerability scanning, and network mapping.</li> <p><span style="font-size: 0;"></span>🔹 Social Engineering: Reconnaissance can also involve social engineering techniques to gather information from individuals or organizations. This includes methods like phishing, pretexting, and impersonation.</li> </ol> </h4> <h2>Tools <div align="center"> </div> <h4> <ul> <p><span style="font-size: 0;"></span>🔹<a href="https://nmap.org/">Nmap</a>: A powerful network scanning tool used for port scanning and network mapping.</li> <p><span style="font-size: 0;"></span>🔹<a href="https://www.wireshark.org/">Wireshark</a>: A network protocol analyzer for capturing and analyzing network traffic.</li> <p><span style="font-size: 0;"></span>🔹<a href="https://cirt.net/Nikto2">Nikto</a>: A web server scanner that performs comprehensive vulnerability assessments.</li> <p><span style="font-size: 0;"></span>🔹<a href="https://github.com/OJ/gobuster">Gobuster</a>: A tool used for directory and DNS busting during reconnaissance.</li> </ul> </h4> <p>These are just a few examples of tools used in reconnaissance. Remember to always use these tools responsibly and legally, respecting the privacy and security of others.</p> <h2> Resources <div align="center"> </div> <p>Here are some additional resources to learn more about Reconnaissance:</p> <h4> <ul> <p><span style="font-size: 0;"></span>🔹<a href="https://www.amazon.com/Web-Application-Hackers-Handbook-Exploiting/dp/1118026470">The Web Application Hacker's Handbook</a> by Dafydd Stuttard and Marcus Pinto</li> <p><span style="font-size: 0;"></span>🔹<a href="https://osintframework.com/">OSINT Framework</a>: A collection of various tools and resources for OSINT.</li> <p><span style="font-size: 0;"></span>🔹<a href="https://owasp.org/www-project-top-ten/">OWASP Top Ten Project</a>: A list of the top ten most critical web application security risks</li> </ul> </h4> <div align="center"> </div> </body>