官术网_书友最值得收藏!

Stealth scanning strategies

The greatest risk involved in active reconnaissance is being discovered by the target. Using the tester's time and data stamps, the source IP address, and additional information, the target can identify the source of the incoming reconnaissance. Therefore, stealth techniques are employed to minimize the chances of being detected.

When employing stealth to support reconnaissance, a tester mimicking the actions of a hacker will do the following:

  • Camouflage tool signatures to avoid detection or triggering an alarm
  • Hide the attack within legitimate traffic
  • Modify the attack to hide the source and type of traffic
  • Make the attack invisible using nonstandard traffic types or encryption

Stealth scanning techniques can include some or all of the following:

  • Adjusting the source IP stack and tool identification settings
  • Modifying packet parameters (nmap)
  • Using proxies with anonymity networks (ProxyChains and the Tor network)
主站蜘蛛池模板: 高州市| 韶关市| 綦江县| 扬中市| 响水县| 安徽省| 兰溪市| 台北市| 泽普县| 南江县| 宁武县| 通渭县| 株洲市| 仙居县| 梁河县| 依安县| 高州市| 定陶县| 定兴县| 仪征市| 淅川县| 博客| 泸水县| 贡山| 镇平县| 白水县| 澎湖县| 通山县| 合山市| 固安县| 资源县| 镇巴县| 资中县| 威信县| 池州市| 上蔡县| 名山县| 灵山县| 富锦市| 子洲县| 德保县|