- Applied Network Security
- Arthur Salmon Warun Levesque Michael McLafferty
- 220字
- 2021-07-02 23:31:00
Spoofing and decoy scans
When we are scanning machines that are not ours, we often want to hide our IP (our identity). Obviously, every packet must contain our source address or else the response from the target system will not know where to return to. The same applies to spoofing our IP when using Nmap. We can spoof our IP address (-S) in Nmap, but as a result, any response and any info we are trying to gather will return to the spoofed IP. Not very useful if we are scanning in order to gather info. A better solution is to obfuscate our IP address. In other words, we bury our IP address among many IP addresses so that the network/security admin can't pinpoint the source of the scan. Nmap allows us to use decoy IP addresses so that it looks like many IP addresses are scanning the target. We can do this by using the -D switch, such as typing nmap -sS 192.168.10.70 -D 10.0.0.1,10.0.0.2,10.0.0.4:

This scan will use three decoy IP addresses, but it will also use our own address. In this way, we get responses and the info on the target and the admin of the system sees scans coming from four systems simultaneously. In this way, he can't pinpoint the true source of the scan easily.
- Web漏洞分析與防范實戰(zhàn):卷1
- SASE原理、架構(gòu)與實踐
- 網(wǎng)絡(luò)空間攻防技術(shù)原理
- 大型互聯(lián)網(wǎng)企業(yè)安全架構(gòu)
- Testing and Securing Android Studio Applications
- 計算機網(wǎng)絡(luò)安全技術(shù)研究
- Building a Home Security System with BeagleBone
- 網(wǎng)絡(luò)安全態(tài)勢感知
- 空間群組密鑰管理研究:基于自主的深空DTN密鑰管理
- Learning Pentesting for Android Devices
- 構(gòu)建新型網(wǎng)絡(luò)形態(tài)下的網(wǎng)絡(luò)空間安全體系
- Cybersecurity Threats,Malware Trends,and Strategies
- Android Application Security Essentials
- 網(wǎng)絡(luò)空間安全實戰(zhàn)基礎(chǔ)
- Metasploit 5.0 for Beginners