Reconnaissance Tactics - Passive vs active methods

Passive vs Active Reconnaissance: What's the Difference?

Reconnaissance is the information-gathering phase that precedes any technical attack. Before you exploit a vulnerability, you find it. Before you find it, you understand the target's attack surface. Recon is how you build that understanding.

The fundamental distinction in recon is passive versus active. Passive recon gathers information without directly interacting with the target's systems. Active recon involves direct contact. The difference matters for two reasons: detection risk and legal standing.

Passive Reconnaissance

graph TD
    subgraph "Passive Reconnaissance (Undetectable)"
        direction TB
        P_NET["Network Passive"]
        P_NET --> P1["WiFi monitor mode
(capture without transmitting)"]
        P_NET --> P2["BLE advertisement
listening"]
        P_NET --> P3["Traffic sniffing
(promiscuous mode)"]

        P_OSINT["OSINT Passive"]
        P_OSINT --> P4["WHOIS / DNS lookups"]
        P_OSINT --> P5["WiGLE database
(historical WiFi maps)"]
        P_OSINT --> P6["Social media
research"]
        P_OSINT --> P7["Certificate
transparency logs"]
    end

    subgraph "Active Reconnaissance (Detectable)"
        direction TB
        A_NET["Network Active"]
        A_NET --> A1["Port scanning
(Nmap, Masscan)"]
        A_NET --> A2["Vulnerability scanning
(Nessus, OpenVAS)"]
        A_NET --> A3["WiFi deauth testing
(triggers alerts)"]
        A_NET --> A4["Probe requests
(active WiFi scanning)"]

        A_SOCIAL["Social Active"]
        A_SOCIAL --> A5["Phishing emails
(social engineering)"]
        A_SOCIAL --> A6["Phone pretexting"]
        A_SOCIAL --> A7["Physical site visit"]
    end

    subgraph "Detection Risk Scale"
        ZERO["Zero footprint
(passive network)"]
        LOW["Low risk
(OSINT queries)"]
        MED["Medium risk
(port scans)"]
        HIGH["High risk
(vuln scans, deauth)"]
    end

    P1 & P2 & P3 -.-> ZERO
    P4 & P5 & P6 & P7 -.-> LOW
    A1 & A4 -.-> MED
    A2 & A3 -.-> HIGH

Reconnaissance techniques organized by type and detection risk - passive methods leave no trace while active methods may trigger IDS alerts

Passive recon is any information gathering that doesn't touch the target's infrastructure. Examples:

  • Querying public DNS records
  • Looking up domain registration via WHOIS
  • Searching Shodan for the target's IP ranges
  • Reading the target's website, job postings, and press releases
  • Searching LinkedIn for employee names and technology stacks
  • Checking Certificate Transparency logs for subdomains
  • Passive wireless scanning of beacon frames broadcast near the target facility
  • Passive BLE scanning of advertisement packets in the target environment

The "no trace" characteristic of passive recon: the target's logs don't show your activity. Their intrusion detection systems don't fire. They have no way of knowing the reconnaissance is happening.

Active Reconnaissance

Active recon involves direct interaction with the target's systems. The target can potentially detect it because your requests appear in their access logs or trigger their intrusion detection rules. Examples:

  • Port scanning (nmap) - directly probing which ports are open
  • Service version detection - sending specific probes
  • Web application crawling
  • Transmitting probe requests to get responses from specific WiFi APs
  • Connecting to a BLE device to read its GATT services

The Detection Risk Differential

Passive recon carries essentially zero detection risk. Active recon detection risk scales with aggressiveness and the target's monitoring maturity:

Low detection risk: Single, slow port scans. Normal-looking HTTP requests to public pages.

Medium detection risk: Systematic port scans across multiple hosts. Repetitive authentication attempts.

High detection risk: Aggressive SYN flood scans, vulnerability scanning with known signatures, brute-force attempts.

Legal Considerations

graph TD
    START["Planning
Reconnaissance"] --> AUTH{"Have written
authorization?"}
    AUTH -->|"Yes"| SCOPE{"Activity within
scope?"}
    AUTH -->|"No"| PUB{"Targeting only
public information?"}

    SCOPE -->|"Yes"| BOTH["Passive + Active
reconnaissance OK"]
    SCOPE -->|"No"| STOP1["STOP - Out of scope"]

    PUB -->|"Yes"| PASSIVE["Passive OSINT only
(WHOIS, public records,
passive WiFi listen)"]
    PUB -->|"No"| STOP2["STOP - Need authorization"]

    BOTH --> REGION{"EU region
device?"}
    REGION -->|"Yes"| EU["Deauth disabled
Handshake passive-only
(RED compliance)"]
    REGION -->|"No"| FULL["Full active testing
available"]

    PASSIVE --> LEGAL["Legally defensible
(no interaction
with target)"]

Legal decision framework for reconnaissance activities - authorization scope and regional regulations determine what techniques are permitted

Passive recon from public sources is legal everywhere. Active recon against systems you're not authorized to access is a different legal situation - in most jurisdictions, probing systems without written authorization constitutes unauthorized computer access regardless of how passive or non-destructive the probe is.

Wireless nuance: passively receiving beacon frames and BLE advertisements that devices broadcast to everyone is legally analogous to passive recon from public sources. Actively connecting to a WiFi AP or BLE device you're not authorized to use is a different matter.

Wireless Recon in Practice

sequenceDiagram
    participant OP as Operator
    participant BN as BLEShark Nano
    participant ENV as RF Environment
    participant DB as Analysis Database

    rect rgb(30, 40, 30)
    Note over OP,ENV: Phase 1: Passive WiFi Recon
    OP->>BN: Enable WiFi scanner
    BN->>ENV: Listen on all channels (no transmit)
    ENV-->>BN: Beacon frames from APs
    ENV-->>BN: Probe requests from clients
    BN-->>OP: SSID list, channels, encryption types
    OP->>DB: Log networks and client MACs
    end

    rect rgb(30, 30, 40)
    Note over OP,ENV: Phase 2: Passive BLE Recon
    OP->>BN: Enable BLE scanner
    BN->>ENV: Listen on channels 37, 38, 39
    ENV-->>BN: BLE advertisements
    BN-->>OP: Device names, UUIDs, RSSI
    OP->>DB: Log BLE devices and manufacturers
    end

    rect rgb(40, 30, 30)
    Note over OP,ENV: Phase 3: Active Testing (if authorized)
    OP->>BN: Enable handshake capture
    BN->>ENV: Deauth frame (non-EU only)
    ENV-->>BN: WPA2 4-way handshake
    OP->>DB: Save handshake for offline analysis
    end

    Note over OP,DB: Correlate WiFi and BLE data
to map target environment

BLEShark Nano wireless reconnaissance workflow - passive phases generate zero detectable traffic, active testing requires authorization

Passive wireless recon: Putting a WiFi interface in monitor mode and listening for beacon frames without associating with any network. BLE scanning without connecting to any device. The BLEShark Nano's WiFi and BLE scanning features operate in this mode - receiving and recording publicly broadcast wireless traffic without transmitting anything that interacts with target systems.

Active wireless recon: Sending probe request frames to elicit responses from specific APs. Connecting to a BLE device to enumerate GATT services. Sending deauth frames to force re-authentication (for handshake capture). The BLEShark Nano's deauth checker uses passive monitoring only - it listens but doesn't transmit. Deauth transmit (for authorized testing) is active. In the EU, deauth transmit is disabled per RED regulations.

Using the BLEShark Nano for Passive Wireless Recon

The BLEShark Nano handles the reconnaissance phase: WiFi AP enumeration showing SSID, BSSID, signal strength, channel, and encryption type. BLE device enumeration showing device name, manufacturer data, service UUIDs, and signal strength. Deauth detection - passive monitoring for deauth frame floods.

All passive. All battery-powered. No laptop required for the recon phase. Combine multiple units via Shiver mesh for broader coverage across a larger physical space.

Get the BLEShark Nano - $36.99+

Back to blog

Leave a comment