- Applied Network Security
- Arthur Salmon Warun Levesque Michael McLafferty
- 220字
- 2021-07-02 23:31:00
Spoofing and decoy scans
When we are scanning machines that are not ours, we often want to hide our IP (our identity). Obviously, every packet must contain our source address or else the response from the target system will not know where to return to. The same applies to spoofing our IP when using Nmap. We can spoof our IP address (-S) in Nmap, but as a result, any response and any info we are trying to gather will return to the spoofed IP. Not very useful if we are scanning in order to gather info. A better solution is to obfuscate our IP address. In other words, we bury our IP address among many IP addresses so that the network/security admin can't pinpoint the source of the scan. Nmap allows us to use decoy IP addresses so that it looks like many IP addresses are scanning the target. We can do this by using the -D switch, such as typing nmap -sS 192.168.10.70 -D 10.0.0.1,10.0.0.2,10.0.0.4:

This scan will use three decoy IP addresses, but it will also use our own address. In this way, we get responses and the info on the target and the admin of the system sees scans coming from four systems simultaneously. In this way, he can't pinpoint the true source of the scan easily.
- Mobile Forensics Cookbook
- 零信任網(wǎng)絡(luò):在不可信網(wǎng)絡(luò)中構(gòu)建安全系統(tǒng)
- 安全實(shí)戰(zhàn)之滲透測(cè)試
- Python Penetration Testing Cookbook
- 計(jì)算機(jī)網(wǎng)絡(luò)安全基礎(chǔ)(第5版)
- Instant Java Password and Authentication Security
- 數(shù)據(jù)安全領(lǐng)域指南
- 網(wǎng)絡(luò)安全設(shè)計(jì)、配置與管理大全
- 華為防火墻實(shí)戰(zhàn)指南
- 從實(shí)踐中學(xué)習(xí)密碼安全與防護(hù)
- 黑客攻擊與防范實(shí)戰(zhàn)從入門(mén)到精通
- 數(shù)字銀行安全體系構(gòu)建
- 黑客攻防入門(mén)
- BeagleBone for Secret Agents
- 隱私計(jì)算與密碼學(xué)應(yīng)用實(shí)踐