官术网_书友最值得收藏!

Mapping beyond the firewall

Attackers normally start network debugging using the traceroute utility, which attempts to map all the hosts on a route to a specific destination host or system. Once the target is reached, as the TTL field will be zero, the target will discard the datagram and generate an ICMP time exceeded packet back to its originator. A regular traceroute will be as follows:

As you can see from the preceding example, we cannot go beyond a particular IP, which most probably means that there is a packet filtering device at hop 4. Attackers would dig a little bit deeper to understand what is deployed on that IP.

Deploying the default UDP datagram option will increase the port number every time it sends an UDP datagram. Hence, attackers will start pointing a port number to reach the final target destination.

主站蜘蛛池模板: 苗栗县| 东兴市| 房产| 如皋市| 马边| 宿松县| 会泽县| 祁阳县| 侯马市| 柘城县| 玉溪市| 洪泽县| 调兵山市| 南川市| 红桥区| 杭锦后旗| 晋宁县| 图们市| 理塘县| 乐东| 鄂温| 海兴县| 河曲县| 阿尔山市| 中超| 青铜峡市| 裕民县| 延庆县| 罗平县| 永州市| 绥芬河市| 武乡县| 上高县| 萝北县| 日喀则市| 会东县| 富锦市| 察隅县| 平阴县| 黔西县| 石家庄市|