Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 905

Reconnaissance

What is Reconnaissance?

ReconnaissanceThe first phase of an attack, in which adversaries gather information about a target's people, technology, and exposure before launching intrusion attempts.


Reconnaissance is the information-gathering stage that precedes intrusion. In MITRE ATT&CK it appears as tactic TA0043 and includes techniques such as scanning IP ranges, harvesting employee names from LinkedIn, OSINT collection, DNS enumeration, and searching for exposed credentials on paste sites. It is also the first phase of the Lockheed Martin Cyber Kill Chain. Reconnaissance can be passive — pulling data already published on the internet — or active, where the attacker directly probes the target and may generate telemetry. Defenders reduce reconnaissance value through attack surface management, deception, brand monitoring, takedown services, and by detecting suspicious scanning or enumeration in network logs.

Examples

  1. 01

    Scraping a company's GitHub organization for hard-coded credentials and internal hostnames.

  2. 02

    Mass scanning the internet for exposed RDP servers and pre-authentication banners.

Frequently asked questions

What is Reconnaissance?

The first phase of an attack, in which adversaries gather information about a target's people, technology, and exposure before launching intrusion attempts. It belongs to the Defense & Operations category of cybersecurity.

What does Reconnaissance mean?

The first phase of an attack, in which adversaries gather information about a target's people, technology, and exposure before launching intrusion attempts.

How does Reconnaissance work?

Reconnaissance is the information-gathering stage that precedes intrusion. In MITRE ATT&CK it appears as tactic TA0043 and includes techniques such as scanning IP ranges, harvesting employee names from LinkedIn, OSINT collection, DNS enumeration, and searching for exposed credentials on paste sites. It is also the first phase of the Lockheed Martin Cyber Kill Chain. Reconnaissance can be passive — pulling data already published on the internet — or active, where the attacker directly probes the target and may generate telemetry. Defenders reduce reconnaissance value through attack surface management, deception, brand monitoring, takedown services, and by detecting suspicious scanning or enumeration in network logs.

How do you defend against Reconnaissance?

Defences for Reconnaissance typically combine technical controls and operational practices, as detailed in the full definition above.

Related terms

See also