Make Reconnaissance Harder for the Bad Guys-WST


June 20, 2019 Make Reconnaissance Harder for the Bad Guys - WST Before an attacker can attempt to gain access to a network, they must first find the resources utilized by the organization to attack. This is what we call the reconnaissance phase. During this phase public data, such as WHOIS information, domains, IP addresses, and email addresses is collected and documented to give the attacker a fingerprint of an organization and what may be available to exploit. Let's take a look at a few of the tools that we use during our reconnaissance phase: DataSploit - [...]