- Mastering Kali Linux for Advanced Penetration Testing(Second Edition)
- Vijay Kumar Velu
- 161字
- 2021-07-02 21:04:21
Identifying the external network infrastructure
Once the tester's identity is protected, identifying the devices on the internet-accessible portion of the network is the next critical step in scanning a network.
Attackers and penetration testers use this information to do the following:
- Identify devices that may confuse (load balancers) or eliminate (firewalls and packet inspection devices) test results
- Identify devices with known vulnerabilities
- Identify the requirement for continuing to implement stealthy scans
- Gain an understanding of the target's focus on secure architecture and on security in general
traceroute provides basic information on packet filtering abilities; some other applications on Kali include the following:

The following screenshot shows the results obtained from running the lbd script against Facebook; as you can see, Google uses both DNS-Loadbalancing and HTTP-Loadbalancing on its site. From a penetration tester's perspective, this information could be used to explain why spurious results are obtained, as the load balancer shifts a particular tool's activity from one server to another:

推薦閱讀
- Python程序設(shè)計教程(第2版)
- HTML5移動Web開發(fā)技術(shù)
- Learning ROS for Robotics Programming(Second Edition)
- LabVIEW程序設(shè)計基礎(chǔ)與應(yīng)用
- Python從小白到大牛
- 程序員面試算法寶典
- Web全棧工程師的自我修養(yǎng)
- 秒懂設(shè)計模式
- Apache Karaf Cookbook
- C語言程序設(shè)計
- Getting Started with Gulp
- 編程與類型系統(tǒng)
- Django 3.0入門與實踐
- C# Multithreaded and Parallel Programming
- C編程技巧:117個問題解決方案示例