官术网_书友最值得收藏!

Active Reconnaissance of External and Internal Networks

The main goal of the active reconnaissance phase is to collect and weaponize the information about the target as much as possible in order to facilitate the exploitation phase of the kill chain methodology.

We have seen how to perform passive reconnaissance using OSINT, which is almost undetectable, and can yield a significant amount of information about the target organization and its users.

Active reconnaissance builds on the results of OSINT and passive reconnaissance, and emphasizes more focused probes to identify the path to the target and the exposed attack surface of the target. In general, complex systems have a greater attack surface, and each surface may be exploited and then leveraged to support additional attacks.

Although active reconnaissance produces more useful information, interactions with the target system may be logged, triggering alarms by protective devices, such as firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems (IPS).

As the usefulness of the data to the attacker increases, so does the risk of detection; this is shown in the following diagram:

To improve the effectiveness of active reconnaissance in providing detailed information, our focus will be on using stealthy, or difficult to detect, techniques.

In this chapter, you will learn about the following topics:

  • Stealth scanning strategies
  • External and internal infrastructure, host discovery, and enumeration
  • The comprehensive reconnaissance of applications, especially using recon-ng
  • The enumeration of internal hosts using DHCP
  • Useful Microsoft Windows commands for penetration testing
  • Taking advantage of default configurations
主站蜘蛛池模板: 高淳县| 张家港市| 凤翔县| 苍梧县| 江川县| 中卫市| 申扎县| 邵武市| 云龙县| 南昌县| 贵南县| 鹤山市| 水富县| 鲁甸县| 定兴县| 垣曲县| 齐齐哈尔市| 抚顺市| 筠连县| 怀远县| 漾濞| 邵阳市| 永昌县| 长阳| 彩票| 昭觉县| 十堰市| 乳山市| 常州市| 兴和县| 离岛区| 石棉县| 鹿泉市| 凭祥市| 萍乡市| 犍为县| 阳信县| 察雅县| 兴和县| 汝阳县| 东源县|