官术网_书友最值得收藏!

Spoofing and decoy scans

When we are scanning machines that are not ours, we often want to hide our IP (our identity). Obviously, every packet must contain our source address or else the response from the target system will not know where to return to. The same applies to spoofing our IP when using Nmap. We can spoof our IP address (-S) in Nmap, but as a result, any response and any info we are trying to gather will return to the spoofed IP. Not very useful if we are scanning in order to gather info. A better solution is to obfuscate our IP address. In other words, we bury our IP address among many IP addresses so that the network/security admin can't pinpoint the source of the scan. Nmap allows us to use decoy IP addresses so that it looks like many IP addresses are scanning the target. We can do this by using the -D switch, such as typing nmap -sS 192.168.10.70 -D 10.0.0.1,10.0.0.2,10.0.0.4:

This scan will use three decoy IP addresses, but it will also use our own address. In this way, we get responses and the info on the target and the admin of the system sees scans coming from four systems simultaneously. In this way, he can't pinpoint the true source of the scan easily.

主站蜘蛛池模板: 宜川县| 洪江市| 太仓市| 桓仁| 双柏县| 祁连县| 桐庐县| 汉沽区| 肥西县| 宣武区| 伊宁县| 铜陵市| 澜沧| 临夏县| 丽水市| 汉源县| 贵定县| 临猗县| 饶阳县| 汤阴县| 林周县| 萨迦县| 绥江县| 康乐县| 顺平县| 木兰县| 长武县| 贡觉县| 陆川县| 蓬莱市| 那曲县| 白河县| 如东县| 马边| 沾益县| 台中县| 阜城县| 大宁县| 吕梁市| 志丹县| 偃师市|