Active Reconnaissance
Passive recon keeps your hands clean — you never touch the target. Active recon means you're sending packets directly at the system. That creates noise, and potentially logs. This room covers the core active recon tools: web browser DevTools, ping, traceroute, telnet, and netcat. Simple tools, but knowing how to extract intel from them is a foundational skill. Let's go through them one by one.
Skills You Will Learn
Walkthrough Phases
Web Browser DevTools
Use browser DevTools to inspect web app traffic, headers, and device emulation before touching the terminal.
Ping — Host Discovery
Confirm whether the target host is alive using ICMP echo requests and interpret TTL and packet size.
Traceroute — Path Mapping
Map the network path to the target by identifying each router hop between you and the destination.
Telnet — Banner Grabbing
Use telnet to connect to open ports and manually interact with plaintext protocols to extract server banners.
Netcat — The Swiss Army Knife
Use netcat to grab service banners and set up listeners for direct TCP communication.
Putting It All Together
Combine all active recon tools into a repeatable workflow for initial target assessment.