- Mastering Kali Linux for Advanced Penetration Testing(Second Edition)
- Vijay Kumar Velu
- 142字
- 2021-07-02 21:04:22
Mapping beyond the firewall
Attackers normally start network debugging using the traceroute utility, which attempts to map all the hosts on a route to a specific destination host or system. Once the target is reached, as the TTL field will be zero, the target will discard the datagram and generate an ICMP time exceeded packet back to its originator. A regular traceroute will be as follows:

As you can see from the preceding example, we cannot go beyond a particular IP, which most probably means that there is a packet filtering device at hop 4. Attackers would dig a little bit deeper to understand what is deployed on that IP.
Deploying the default UDP datagram option will increase the port number every time it sends an UDP datagram. Hence, attackers will start pointing a port number to reach the final target destination.
- Flask Web全棧開發實戰
- PHP程序設計(慕課版)
- Learning RabbitMQ
- Visual Basic程序設計教程
- Web Development with Django Cookbook
- Data Analysis with IBM SPSS Statistics
- BeagleBone Black Cookbook
- HTML5秘籍(第2版)
- 貫通Tomcat開發
- OpenCV Android開發實戰
- 30天學通C#項目案例開發
- Modernizing Legacy Applications in PHP
- 用Go語言自制編譯器
- Java EE框架開發技術與案例教程
- 嵌入式Linux與物聯網軟件開發:C語言內核深度解析