All Rooms

Active Reconnaissance

easy1htryhackme

Passive recon keeps your hands clean — you never touch the target. Active recon means you're sending packets directly at the system. That creates noise, and potentially logs. This room covers the core active recon tools: web browser DevTools, ping, traceroute, telnet, and netcat. Simple tools, but knowing how to extract intel from them is a foundational skill. Let's go through them one by one.

Skills You Will Learn

active-reconpingtraceroutetelnetnetcatweb-browser-devtools

Walkthrough Phases

1

Web Browser DevTools

Use browser DevTools to inspect web app traffic, headers, and device emulation before touching the terminal.

2

Ping — Host Discovery

Confirm whether the target host is alive using ICMP echo requests and interpret TTL and packet size.

3

Traceroute — Path Mapping

Map the network path to the target by identifying each router hop between you and the destination.

4

Telnet — Banner Grabbing

Use telnet to connect to open ports and manually interact with plaintext protocols to extract server banners.

5

Netcat — The Swiss Army Knife

Use netcat to grab service banners and set up listeners for direct TCP communication.

6

Putting It All Together

Combine all active recon tools into a repeatable workflow for initial target assessment.

12 questions to answer

alienrecon start thm-activerecon

Don't have AlienRecon? Get started here