Active VS Passive Recon
Active Recon: Active Reconnaissance is when there is direct interaction with the target network host for collecting the information. As there is direct communication, the logs or records are created in the target host to the target system, which can put the hacker or attacker in danger as this can reveal the hacker’s identity.
Passive Recon: Passive Reconnaissance is the process where there is no interaction with the target for collecting the information. So no logs or traces are created in the target client-side system. Information like DNS Records, WHOIS Records, Reverse IP Data, etc., are collected in this phase. No requests are made while collecting the information to the target domain. Fewer chances of detecting the hacker are maintained in this phase. Most of the data is assembled from OSINT means which are publicly available on various platforms.
TIDoS-Framework – Offensive Web Application Penetration Testing Framework
Being a penetration tester, you must have worked with Metasploit Framework for different attacks and information gathering. TIDoS Framework is quite similar to Metasploit Framework; Tidos Framework is an open-source toolkit that is free to use. This toolkit provides all major web application tests like Scanning of Target, Enumeration process, and Vulnerability Assessment and Analysis. This toolkit has five main phases, subdivided into 14 sub-phases consisting of a total of 108 modules. Reconnaissance Phase has 50 modules of its own (including active and passive recon, information disclosure modules). You just need to provide the target domain and leave everything is to this tool. TIDoS toolkit has full verbose out support, so you’ll know what’s going on.
Note: Make Sure You have Python Installed on your System, as this is a python-based tool. Click to check the Installation process: Python Installation Steps on Linux