47. Introducing Ethical Hacking Basics: Scanning and Reconnaissance
Termux is often utilized for mobile security testing (ethical hacking). This lesson introduces the reconnaissance phase, focusing on legal, authorized networks (like your own home network).
Disclaimer: Always ensure you have explicit, written permission before scanning or testing any network or system that you do not own or administer. Unauthorized network activity is illegal.
Reconnaissance Tools Revisited
Reconnaissance is the art of gathering information about a target.
-
Host Discovery (
nmap): We previously usednmap. For recon, you might use it to find live hosts on your local network. bashList all live hosts on the 192.168.1.x subnet
$ nmap -sP 192.168.1.0/24
-
Domain Information (
whois): Find registration details for a public domain.bash $ pkg install whois $ whois example.com
-
DNS Lookup (
dig): Advanced tool for querying Domain Name System records.bash $ pkg install dnsutils $ dig google.com A
These tools help security professionals map out attack surfaces and identify potential vulnerabilities before any intrusion attempt is made.