官术网_书友最值得收藏!

Chapter 3. Active Reconnaissance and Vulnerability Scanning

The objective of the reconnaissance phase is to gather as much information about the target as possible in order to facilitate the exploitation phase of the kill chain.

We have seen how passive reconnaissance, which is almost undetectable, can yield a significant amount of information about the target organization and its users.

Active reconnaissance builds on the results of open-source intelligence and passive reconnaissance, and focuses on using probes to identify the path to the target and the exposed attack surface of the target. In general, complex systems have a greater attack surface, and each surface may be exploited and then leveraged to support additional attacks.

Although active reconnaissance produces more information, and more useful information, interactions with the target system may be logged, triggering alarms by protective devices, such as firewalls and intrusion detection systems. As the usefulness of the data to the attacker increases, so does the risk of detection; this is shown in the following diagram:

Active Reconnaissance and Vulnerability Scanning

To improve the effectiveness of active reconnaissance in providing detailed information, our focus will be on using stealthy, or difficult to detect, techniques.

In this chapter, you will learn:

  • Stealth scanning strategies
  • Network infrastructure, host discovery, and enumeration
  • Comprehensive reconnaissance applications, especially recon-ng
  • Targeted vulnerability scanning
主站蜘蛛池模板: 泾川县| 崇仁县| 长治市| 秀山| 桑植县| 河池市| 米林县| 沁源县| 太仆寺旗| 辉县市| 文登市| 黄梅县| 庆阳市| 宁安市| 包头市| 昆山市| 师宗县| 和田市| 苗栗县| 富川| 西安市| 张家界市| 锦屏县| 乐平市| 莱西市| 定州市| 富顺县| 东乌珠穆沁旗| 大同县| 大邑县| 二连浩特市| 上饶县| 南木林县| 营山县| 武强县| 崇义县| 东兰县| 宁南县| 苗栗市| 绍兴市| 莱州市|