Detecting reconnaissance is a key part of network forensics and intrusion detection. Reconnaissance is the phase where attackers gather information about a target system or network before launching the actual attack. This stage often leaves subtle but detectable traces in logs, PCAPs, and network monitoring tools. Identifying reconnaissance early allows defenders to stop intrusions before exploitation, privilege escalation, or lateral movement begins.
This chapter explains the types of reconnaissance, their network-level indicators, and how to detect hostile probing activities.
What Is Reconnaissance?
Reconnaissance (recon) is the information-gathering phase of an attack.
Its purpose is to:
-
Identify open ports and services
-
Discover operating systems and versions
-
Detect vulnerabilities
-
Enumerate users, shares, and directories
-
Map network structure
-
Test firewall rules
-
Gather intelligence for exploitation
Reconnaissance is almost always the attacker’s first technical step.
Types of Reconnaissance
1. External Reconnaissance (Public-Facing)
Performed from outside the network.
Includes:
-
Port scans
-
Banner grabbing
-
OS fingerprinting
-
Web scanning
-
DNS enumeration
-
Email harvesting
Tools:
-
Nmap
-
Masscan
-
Shodan
-
Nikto
-
WhatWeb
-
DNSRecon
2. Internal Reconnaissance (Post-Compromise)
Performed after gaining initial access.
Includes:
-
Host discovery
-
ARP scanning
-
SMB enumeration
-
LDAP/user enumeration
-
Scanner scripts inside a compromised machine
Tools:
-
Nmap
-
CrackMapExec
-
BloodHound
-
PowerView
-
Net commands
Network Indicators of Reconnaissance
Recon activities create noticeable patterns in traffic.
1. High Volume of Port Scanning
Signs:
-
Connection attempts to many ports on one host
-
Repeated SYN packets without corresponding ACK
-
Frequent RST responses
-
Rapid-fire connections
Wireshark filters:
tcp.flags.syn == 1 && tcp.flags.ack == 0
Typical behavior:
-
Thousands of SYN packets within seconds
-
Sequential port probing
-
Randomized port probing (stealth scan)
2. Horizontal Scanning
Attacker checks the same port across multiple hosts.
Example:
-
Scanning TCP 445 across all 10.0.0.X machines
Indicators:
-
Repeated connection attempts to the same port
-
Traffic consistent with worm-like scanning
3. Vertical Scanning
Attacker checks many ports on one host.
Indicators:
-
SYN sweep across 1–65535 ports
-
Dozens of closed/filtered responses
4. OS Fingerprinting
Attackers analyze responses to determine OS/version.
Indicators:
-
Packets with unusual flags (ECN, FIN-only)
-
Crafted TTL and window size probes
-
Unusual ICMP types
Tools like Nmap use these techniques heavily.
5. Banner Grabbing
Attackers attempt to capture service banners.
Indicators:
-
Connections followed by empty payloads
-
Simple text requests like:
-
HEAD / HTTP/1.0 -
QUIT(FTP) -
EHLO(SMTP)
-
6. DNS Enumeration
Signs:
-
High volume of DNS queries
-
Brute-forcing subdomains
-
AXFR zone transfer attempts
Wireshark filter:
dns
7. SMB / LDAP / RDP Probing
Internal recon indicators include:
-
SMB queries to many hosts
-
LDAP user lookup attempts
-
Multiple failed RDP connections
This often occurs after initial compromise.
8. ICMP Sweeps (Ping Sweeps)
Used to discover live hosts.
Indicators:
-
Many ICMP echo requests
-
Sequential scanning of IP ranges
-
No corresponding legitimate need
Wireshark filter:
icmp.type == 8
9. ARP Scanning
Used in internal networks to map devices.
Indicators:
-
ARP requests for entire subnets
-
ARP bursts
Wireshark filter:
arp
Detecting Reconnaissance With Tools
Wireshark
Useful filters:
tcp.flags.syn == 1
icmp
arp
dns
tcp.port == 445
Look for:
-
Sequential IP probes
-
Scatter of SYN packets
-
DNS brute-force patterns
Zeek (Bro)
Relevant logs:
-
conn.log
-
weird.log
-
notice.log
Detection examples:
-
Excessive connection attempts
-
Port scanning signature
-
Unusual service probing
Suricata / Snort
IDS signatures detect:
-
Nmap scans
-
XMAS/NULL/FIN scans
-
UDP probes
-
DNS zone transfer attempts
Firewall & Router Logs
Look for:
-
Repeated blocked connections
-
Unrecognized incoming requests
-
Rapid port sweeps
Reconnaissance by Common Tools (Behavior Patterns)
Nmap
-
SYN/ACK/RST patterns
-
ICMP timestamp probes
-
Service banner grabs
Masscan
-
Extremely fast, high PPS
-
Large number of SYN attempts
Nikto
-
HTTP directory enumeration
-
Security.txt probing
Dirsearch/Gobuster
-
Web brute-force paths
Recognizing tool fingerprints helps identify attacker methods.
Red Flags for Reconnaissance (Checklist)
-
High rate of SYN packets with no completion
-
Many connection resets
-
Repeated probing of specific services
-
DNS enumeration attempts
-
ICMP sweeps across subnets
-
ARP storms on internal network
-
Scans originating from unusual hosts
-
Unauthorized SMB, LDAP, or RDP attempts
-
Short bursts of high-speed port scans
-
Use of known scanning tools, patterns, or payloads
Intel Dump
-
Reconnaissance is attacker information gathering and usually the first technical step of a cyberattack.
-
Indicators include port scanning (horizontal/vertical), DNS enumeration, OS fingerprinting, ARP/ICMP sweeps, SMB/LDAP probing, and banner grabbing.
-
Network forensics tools like Wireshark, Zeek, Suricata, Snort, and firewall logs reveal recon behaviors through packet patterns and scan fingerprints.
-
Common signs: repeated SYN packets, sequential IP probes, random subdomain queries, unusual ICMP requests, and bursts of traffic across many ports.
-
Early detection of recon can prevent exploitation and lateral movement, making it vital for incident response.