Exclusive Webinar: Deep Session Inspection and rich metadata can change your security game.

What is Reconnaissance in Cybersecurity?

Reconnaissance is the process of collecting information about a target’s digital footprint to find weaknesses, exposed assets, user behavior, and network layout that could be exploited.

Purpose

The meaning of reconnaissance in cybersecurity contexts centers on stealthy observation. Reconnaissance in cybersecurity can be characterized as a passive or active process using multiple tools like scanning an IP range, using publicly available open-source intel, or port probing a target to understand how it has been configured and where it may have weaknesses. Reconnaissance typically precedes aggressiveness that might include exploitation or lateral movement.

Passive vs Active Reconnaissance

Common reconnaissance steps

A typical reconnaissance workflow often follows these steps:

The core of cyber reconnaissance is the application of various techniques, such as footprinting (sourcing information about domain names and internet protocol addresses), enumeration (identifying users and shares), and OSINT (Open-Source Intelligence) to supply useful context for internal intelligence to find weaknesses. Sophisticated threat actors, advanced persistent threats (APTs), will take advantage of reconnaissance sophistication to limit focus on and detection of exploitation in order to increase the probability of the attack gaining success.

Additional techniques

Ethical / defensive use

Reconnaissance methods are also used defensively by security teams during penetration testing and red team exercises to uncover weaknesses before attackers do. 

If defensive planning is in place for security, appropriate cyber reconnaissance defenses could include, but are not limited to, segmentation, restricted access, and detection. If inappropriate cyber reconnaissance is detected early and mitigated efficiently, it will be difficult for the attackers to gain further traction and make progress in their respective projects attacking objectives.

Practical defensive measures

Proactive reconnaissance helps organizations monitor systems, fix weaknesses, manage third-party risks, and improve security.

Want to Dive Deeper?

Enhance your perspective with additional analysis and experts take!

One Platform for All Adversaries

See Fidelis in action. Learn how our fast and scalable platforms provide full visibility, deep insights, and rapid response to help security teams across the World protect, detect, respond, and neutralize advanced cyber adversaries.