Reconnaissance Methodology Deep Dive
Why This Order?
1. OSINT First
2. Subdomain Enumeration Second
3. Web Probing Third
4. Host Analysis Fourth
5. Web Analysis Fifth
6. Vulnerability Scanning Last
Passive vs Active
Passive Reconnaissance
Technique
Data Source
Detection Risk
Active Reconnaissance
Technique
Target Contact
Detection Risk
The Checkpoint System
How It Works
Resume Behavior
Clearing Checkpoints
Wildcard Handling
The Problem
Standard Detection
Deep Detection (DEEP_WILDCARD_FILTER)
Rate Limiting Strategy
Why Rate Limit?
Configuration
Adaptive Rate Limiting
Scope Management
In-Scope Filtering
Out-of-Scope Exclusion
Sensitive Domain Exclusion
Output Organization
Tool Selection Rationale
Task
Tool
Why This Tool
Last updated