- Mastering Kali Linux for Advanced Penetration Testing(Second Edition)
- Vijay Kumar Velu
- 142字
- 2021-07-02 21:04:18
Stealth scanning strategies
The greatest risk involved in active reconnaissance is being discovered by the target. Using the tester's time and data stamps, the source IP address, and additional information, the target can identify the source of the incoming reconnaissance. Therefore, stealth techniques are employed to minimize the chances of being detected.
When employing stealth to support reconnaissance, a tester mimicking the actions of a hacker will do the following:
- Camouflage tool signatures to avoid detection or triggering an alarm
- Hide the attack within legitimate traffic
- Modify the attack to hide the source and type of traffic
- Make the attack invisible using nonstandard traffic types or encryption
Stealth scanning techniques can include some or all of the following:
- Adjusting the source IP stack and tool identification settings
- Modifying packet parameters (nmap)
- Using proxies with anonymity networks (ProxyChains and the Tor network)
推薦閱讀
- Reporting with Visual Studio and Crystal Reports
- 數據結構與算法JavaScript描述
- Apache Mahout Clustering Designs
- Learning SciPy for Numerical and Scientific Computing(Second Edition)
- RISC-V體系結構編程與實踐(第2版)
- 精通MATLAB(第3版)
- Python Data Analysis Cookbook
- 領域驅動設計:軟件核心復雜性應對之道(修訂版)
- Learning Concurrent Programming in Scala
- RSpec Essentials
- 從零開始學Linux編程
- Essential C++(中文版)
- 人人都能開發RPA機器人:UiPath從入門到實戰
- 深度學習入門:基于Python的理論與實現
- INSTANT Apache Maven Starter