官术网_书友最值得收藏!

Stealth scanning strategies

The greatest risk involved in active reconnaissance is being discovered by the target. Using the tester's time and data stamps, the source IP address, and additional information, the target can identify the source of the incoming reconnaissance. Therefore, stealth techniques are employed to minimize the chances of being detected.

When employing stealth to support reconnaissance, a tester mimicking the actions of a hacker will do the following:

  • Camouflage tool signatures to avoid detection or triggering an alarm
  • Hide the attack within legitimate traffic
  • Modify the attack to hide the source and type of traffic
  • Make the attack invisible using nonstandard traffic types or encryption

Stealth scanning techniques can include some or all of the following:

  • Adjusting the source IP stack and tool identification settings
  • Modifying packet parameters (nmap)
  • Using proxies with anonymity networks (ProxyChains and the Tor network)
主站蜘蛛池模板: 建德市| 五莲县| 嘉黎县| 鸡西市| 美姑县| 安阳县| 武胜县| 屏东市| 隆昌县| 三河市| 体育| 西青区| 宁海县| 灵武市| 长沙县| 平江县| 静安区| 赤壁市| 琼中| 南岸区| 青冈县| 延长县| 惠来县| 交口县| 阳朔县| 尉犁县| 安丘市| 当涂县| 安塞县| 华安县| 页游| 吉水县| 沧源| 新乡市| 永胜县| 静安区| 金华市| 西昌市| 贵州省| 突泉县| 衡东县|