Emmanuel Umelo
Posted: July 16, 2025
In our last content, we explored the non-intrusive and covert nature of passive reconnaissance. We highlighted, for instance, how its undetectability can be a weapon in the hands of malicious actors and extensively cited tools specific to conducting one. However, today’s content will focus on active reconnaissance, where we will attempt to use case scenarios to explain its woven intricacies.
Active Reconnaissance is the direct interaction with the target to gather information. In this type of reconnaissance, the risk is considerably higher. It has the potential to trigger security alerts and defences. Unlike passive recon, it leaves logs, traces, and even footprints on your target's server.
Note : Before you conduct active recon as a cybersecurity professional, ensure you are authorised and have explicit permission to carry out this operation on any organisation.
In demonstrating how active recons are conducted, we will demonstrate using a simulated environment how an external penetration test is conducted. For this case, let's assume an organisation hired a pentester to conduct a vulnerability assessment and pen-test their systems, networks, and public-facing infrastructure. This time, we are targeting the web server.
These steps show the purpose behind why specific tools are used to conduct this test.
To test the reachability of a host (like a website or IP address) over an IP network, and measure the round-trip time it takes for packets to travel to and fro between your machine and the target, use the command:
ping -c 10 192.168.40.131
To discover hosts and services on the target network, we perform a network scan with the Nmap (Network Mapper) tool.
Result Explanation
The result of the Nmap scan shows ports running and open. It also displays the services and versions available on the target. This way, an attacker could identify possible entry points to exploit.
To check for any hidden files and directories on the web server, the Gobuster tool is used.
Result Explanation
To achieve this, we will use WhatWeb, a web scanner that helps identify the detect the software used by websites. It can detect:
Result Explanation
The output gives the domain name of the target, the IP address, the HTTP header, and the software and technology it is run on.
To check for vulnerabilities in the web server, Nikto can be used. While it is an open-source vulnerability scanner, it is used to perform comprehensive tests to find security issues, misconfigurations, and potential vulnerabilities.
Result Explanation
Amass is an open-source reconnaissance tool that can help check for subdomains. Used for both passive or active reconnaissance, it helps pen-testers map out the public attack surface of a target organisation.
To illustrate, we use the command:
amass enum -active -brute -w -d
Result Explanation
With the use of the active recon tools, we have been able to successfully interact with our target system. We could extract core pieces of information that help us identify open ports, technologies and software used, and the potential vulnerabilities associated with our target, Metaploitable 2.
While active reconnaissance can be a powerful tool in the arsenal of an ethical hacker, it comes with significant ethical and legal considerations. It requires:
Tool Name | Category | Functions | Type | Cost |
---|---|---|---|---|
Ping | Network connection | Verifies network connectivity between your machine and the target. | Command-line (CLI) | Free |
Gobuster | Find hidden files and directories | Directory and file brute-forcing on web servers | Command-line (CLI) | Free |
Whatweb | Detects web technologies (CMS, frameworks, plugins) | WhatWeb is a web scanner that identifies technologies and software used by websites. | Command-line (CLI) | Free |
Nikto | Web server vulnerability scanner | Open-source web server scanner for misconfigurations, outdated software, etc. | Command-line (CLI) | Free |
Enum4linux | SMB enumeration tool | Scans for users, shares, OS, binaries for vulnerabilities leading to privilege escalation. | Command-line (CLI) | Free |
Nmap | Network mapping | Discovers hosts and services on a network through scanning. | Open Source | Free |
AMASS (Active mode) | Active Subdomain, DNS enumeration | DNS enumeration and subdomain brute-force (with -active flag). | Command-line (CLI) | Free |
Metasploit Framework | Active exploitation, service enumeration, vulnerability scanning | Collection of exploits, payloads, post-exploitation tools, simulating real-world attacks. | Open Source | Free |
Ethical Hacking- Reinvent Security | Cybersecurity Laws and Regulations - Canada (ICLG)