官术网_书友最值得收藏!

Identifying the external network infrastructure

Once the tester's identity is protected, identifying the devices on the internet-accessible portion of the network is the next critical step in scanning a network.

Attackers and penetration testers use this information to do the following:

  • Identify devices that may confuse (load balancers) or eliminate (firewalls and packet inspection devices) test results
  • Identify devices with known vulnerabilities
  • Identify the requirement for continuing to implement stealthy scans
  • Gain an understanding of the target's focus on secure architecture and on security in general

traceroute provides basic information on packet filtering abilities; some other applications on Kali include the following:

The following screenshot shows the results obtained from running the lbd script against Facebook; as you can see, Google uses both DNS-Loadbalancing and HTTP-Loadbalancing on its site. From a penetration tester's perspective, this information could be used to explain why spurious results are obtained, as the load balancer shifts a particular tool's activity from one server to another:

主站蜘蛛池模板: 滦南县| 凌云县| 芷江| 榆中县| 科技| 平和县| 桐庐县| 繁昌县| 德州市| 淮安市| 措勤县| 烟台市| 留坝县| 海南省| 龙口市| 彰化县| 水富县| 太康县| 崇礼县| 碌曲县| 吉林省| 通榆县| 天门市| 景洪市| 峨眉山市| 黎城县| 肥东县| 鄂尔多斯市| 格尔木市| 且末县| 安塞县| 鹤峰县| 长汀县| 绥棱县| 宁蒗| 仙游县| 乌兰县| 涪陵区| 普格县| 长子县| 青岛市|