Why Google Can Recon a Network but Your Can’t

Is the scanning of the internet that Google does illegal the same as cybersecurity recon?

The scanning of the internet by search engines like Google is fundamentally different from the kind of reconnaissance activities typically associated with cybersecurity threats. Here’s how:

  1. Purpose and Consent: Google and other search engines crawl the web to index content and make it searchable for users. This activity is generally done with the implicit or explicit consent of website owners who often want their sites to be discoverable in search engines to reach a wider audience. Websites can use the “robots.txt” file to communicate with web crawlers and indicate if they do not want to be scanned or indexed.
  2. Transparency and Good Practice: Search engines operate openly and provide ways for website owners to opt out of being indexed. They also follow certain ethical and technical standards designed to respect website owners’ preferences and minimize any negative impact on the websites they crawl.
  3. Legal Framework: The activity of search engines is generally protected and regulated under different laws that recognize their role in organizing and making information accessible. This is seen as a beneficial service to the public and the internet ecosystem.
  4. Nature of Interaction: The nature of the interaction that search engines have with websites is typically passive and non-intrusive compared to certain types of cybersecurity reconnaissance which might involve probing for vulnerabilities or gathering sensitive information without consent.

In contrast, unauthorized cybersecurity reconnaissance might involve attempts to find security vulnerabilities or gather sensitive information without the consent of the target, which can lead to illegal activities such as hacking.

While both activities involve scanning and gathering information, the context, legality, and intent behind them are quite different. Search engines operate within a framework that is designed to respect privacy and legality, whereas unauthorized cybersecurity reconnaissance does not.

Is the Act of Recon Illeagal?

The legality of reconnaissance, or “recon,” in cybersecurity depends on the intent, methods used, and the specific laws of the jurisdiction in question.

Reconnaissance in cybersecurity involves gathering information about a target system, network, or organization. This can include identifying IP addresses, domain details, network services, and even organizational details such as employee information. The techniques can range from passive (gathering publicly available information) to active (interacting with the target system to gather information).

  1. Legal Reconnaissance: This is typically done as part of ethical hacking or penetration testing, where cybersecurity professionals are authorized by the organization that owns the system to test its defenses. This is legal and is often a critical component of an organization’s security strategy.
  2. Illegal Reconnaissance: This occurs when someone performs reconnaissance activities without permission from the owner of the systems or data being targeted. This can be a precursor to more malicious activities, such as hacking or data theft, and is generally illegal under laws related to unauthorized computer access.

Different countries have laws that address unauthorized access to computer systems and data, such as the Computer Fraud and Abuse Act (CFAA) in the United States, the Computer Misuse Act in the UK, and similar legislation in other countries. These laws typically make it illegal to access or attempt to access a computer system without authorization.

So, the legality of reconnaissance activities in cybersecurity hinges on authorization and the nature of the actions taken.

Fixing Kali Linux Installation or Update Failures Caused by Invalid Signatures

Apt-Get Install Fails with Err1 & 404 Not Found Error

After firing up an old Kali Linux VM and trying to update a software package, I discovered that Kali Linux would not install any new packages nor would it install the latest Operating System update.

I kept getting an error, Err1, and a HTTP 404 Not Found saying it was failing to fetch the packages or updates.

Below are screenshots of the first error I saw when running apt-get install sshpass.

Apt-Get Update Error

I also got a different error when I tried to run apt-get update. This time the error references an invalid signature.

Fix for Kali Linux Invalid Signature Error

Important Notes:

  1. The invalid signature in the error was ED444FF07D8D0BF6, we’ll only need the last part, 7D8D0BF6 for our command.
  2. The key server reference is one I had found on an article on the internet but apparently there are other key servers you can reference as well.

To fix the Invalid Signature error, we’ll have to enter the following command. As of this writing, this command worked for me if entered verbatim.

EXAMPLE:
sudo apt-key adv --keyserver hkp://keyserver.ubuntu.com:80 --recv-keys $key

WHAT I ACTUALLY RAN:
root@kali:/etc/apt# apt-key adv --keyserver hkp://keyserver.ubuntu.com:80 --recv-keys 7D8D0BF6

Executing: /tmp/apt-key-gpghome.a5zcatYyQB/gpg.1.sh --keyserver hkp://keyserver.ubuntu.com:80 --recv-keys 7D8D0BF6
gpg: key ED444FF07D8D0BF6: 22 duplicate signatures removed
gpg: key ED444FF07D8D0BF6: 223 signatures not checked due to missing keys
gpg: key ED444FF07D8D0BF6: "Kali Linux Repository <devel@kali.org>" 238 new signatures
gpg: Total number processed: 1
gpg:         new signatures: 238

Video: Kali Linux Signature Error Fix

Other Helpful Kali Linux References

In the steps above I kind of gloss over some technical parts.

One of those topics was Kali Linux repositories. I’m not an expert on it but know it was important part of troubleshooting and solving my problem. Basically knowing enough to know that was not my issue so I could rule it out.

If you have questions about or just want to dive in to the topic of repositories follow the link below. The page addresses items people frequently get wrong as it can be a bit confusing.

https://stackoverflow.com/questions/66217436/error-gpg-keyserver-receive-failed-no-name

https://www.kali.org/docs/general-use/kali-linux-sources-list-repositories/