官术网_书友最值得收藏!

Identifying the external network infrastructure

Once the tester's identity is protected, identifying the devices on the internet-accessible portion of the network is the next critical step in scanning a network.

Attackers and penetration testers use this information to do the following:

  • Identify devices that may confuse (load balancers) or eliminate (firewalls and packet inspection devices) test results
  • Identify devices with known vulnerabilities
  • Identify the requirement for continuing to implement stealthy scans
  • Gain an understanding of the target's focus on secure architecture and on security in general

traceroute provides basic information on packet filtering abilities; some other applications on Kali include the following:

The following screenshot shows the results obtained from running the lbd script against Facebook; as you can see, Google uses both DNS-Loadbalancing and HTTP-Loadbalancing on its site. From a penetration tester's perspective, this information could be used to explain why spurious results are obtained, as the load balancer shifts a particular tool's activity from one server to another:

主站蜘蛛池模板: 贵定县| 水城县| 叶城县| 洱源县| 土默特右旗| 吴桥县| 定陶县| 临桂县| 永川市| 灵石县| 河南省| 梁山县| 商洛市| 雅安市| 郁南县| 东方市| 甘谷县| 手游| 霍州市| 云梦县| 扶风县| 隆子县| 乐山市| 腾冲县| 大悟县| 抚顺县| 贵南县| 米林县| 汝州市| 德州市| 武夷山市| 沂南县| 台安县| 都昌县| 门头沟区| 甘泉县| 宜兰县| 信阳市| 若尔盖县| 克什克腾旗| 文昌市|