官术网_书友最值得收藏!

  • Applied Network Security
  • Arthur Salmon Warun Levesque Michael McLafferty
  • 220字
  • 2021-07-02 23:31:00

Spoofing and decoy scans

When we are scanning machines that are not ours, we often want to hide our IP (our identity). Obviously, every packet must contain our source address or else the response from the target system will not know where to return to. The same applies to spoofing our IP when using Nmap. We can spoof our IP address (-S) in Nmap, but as a result, any response and any info we are trying to gather will return to the spoofed IP. Not very useful if we are scanning in order to gather info. A better solution is to obfuscate our IP address. In other words, we bury our IP address among many IP addresses so that the network/security admin can't pinpoint the source of the scan. Nmap allows us to use decoy IP addresses so that it looks like many IP addresses are scanning the target. We can do this by using the -D switch, such as typing nmap -sS 192.168.10.70 -D 10.0.0.1,10.0.0.2,10.0.0.4:

This scan will use three decoy IP addresses, but it will also use our own address. In this way, we get responses and the info on the target and the admin of the system sees scans coming from four systems simultaneously. In this way, he can't pinpoint the true source of the scan easily.

主站蜘蛛池模板: 海晏县| 东安县| 云梦县| 新宁县| 司法| 阿瓦提县| 衡东县| 辛集市| 咸丰县| 吉林市| 六枝特区| 淅川县| 巩留县| 信宜市| 吉木萨尔县| 莒南县| 上栗县| 武胜县| 调兵山市| 合山市| 花莲县| 垣曲县| 昔阳县| 泗阳县| 依安县| 清丰县| 滕州市| 龙山县| 永春县| 应城市| 遂川县| 石渠县| 道孚县| 开封市| 邮箱| 贵德县| 松滋市| 宁国市| 灌云县| 西乌| 灵璧县|