Cybersecurity Reconnaissance කියන්නේ මොනවාද? Attackers Information Gather කරන විදිහ
හැඳින්වීම (Introduction)
Cyber attack එකක් කියන්නේ එකවරම system එකක් break කරන එකක් නෙමෙයි.
ඒක slowly, quietly, planned කරපු process එකක්.
ඒ process එකේ පළමු සහ වැදගත්ම stage එක තමයි Reconnaissance.
සරලව කියනවා නම්
Reconnaissance කියන්නේ “ආරක්ෂාවට යන්න කලින් ගෙදර වටේ බලන එක” වගේ.
Hackers වගේම ethical hackers, penetration testers, defenders හැමෝටම මේ concept එක හොඳට අවබෝදයෙන් ඉන්න එක ඉතාමත් වැදගත් .
Reconnaissance කියන්නේ මොකක්ද? (What Is Reconnaissance)
Reconnaissance කියන්නේ target system, network, company, හෝ person ගැන information collect කරන process එක.
Attack එකක් කරන්න කලින් attackers අහන ප්රශ්න:
Target එක alive ද?
IP addresses මොනවාද?
Domains, subdomains?
Open ports?
Services?
Employees ගැන public info තියෙනවද?
Reconnaissance වැඩ කරන විදිහ (How It Works)
Reconnaissance generally types දෙකක් තියෙනවා:
01) Passive Reconnaissance (Quietly)
Target එකට directly touch නොකර information gather කරන එක.
Examples:
Google search (Google Dorking)
Company website
LinkedIn profiles
GitHub repositories
WHOIS records
Social media posts
Target එකට alert එකක්වත් නැහැ.
📌 Example:
Employee එක LinkedIn එකේ:
“Managing Linux servers on AWS”
Attacker learns:
OS = Linux
Cloud = AWS
02) Active Reconnaissance (Direct Interaction)
Target system එක directly scan කරන එක.
Examples:
Nmap scans
Port scanning
Service detection
Banner grabbing
📌 Example:
nmap -sV target.com
Open ports + services revealed
Target logs වල trace එකක් යන්න පුළුවන්
Reconnaissance එකේ Main Steps
🔹 Step 1: Target Identification
Domain names
IP ranges
Email formats
🔹 Step 2: Network Mapping
Live hosts
Firewalls
Routers
🔹 Step 3: Service & Technology Discovery
Web servers
Databases
Cloud services
APIs
🔹 Step 4: Human Intelligence
Employees
Roles
Tech stack hints
Real-World Examples (Mini Stories)
Company Breach Story
Attacker:
Finds company GitHub repo
Discovers API key leaked
Uses key to access cloud storage
No hacking tools needed. Just Reconnaissance mistake.
Personal Attack Example
Instagram bio:
“IT admin | Home lab | Router testing”
Attacker learns:
Tech interest
Possible weak home network
Reconnaissance වැදගත් ඇයි? (Why It Matters)
Attackersට:
Attack surface identify කරන්න
Best entry point choose කරන්න
Effort minimize කරන්න
Defendersට:
Exposed assets find කරන්න
Information leakage reduce කරන්න
Awareness training improve කරන්න
Future Trends & Career Value
OSINT (Open Source Intelligence) roles growing
Red Team / Blue Team operations
Threat Intelligence Analysts
AI-based Recon tools
Did You Know? / Tips Box
🔹 Did You Know?
Most cyber attacks succeed due to information leakage, not advanced exploits.
🔹 Defender Tip:
Google your own company name like an attacker.
🔹 Beginner Tip:
Learn Recon before exploitation. Order matters.
Free Resources for Learning Reconnaissance
TryHackMe – OSINT & Recon rooms
Google Hacking Database (GHDB)
OWASP Information Gathering Guide
Shodan (Read-only exploration)

Comments
Post a Comment