官术网_书友最值得收藏!

Chapter 3. Active Reconnaissance and Vulnerability Scanning

The objective of the reconnaissance phase is to gather as much information about the target as possible in order to facilitate the exploitation phase of the kill chain.

We have seen how passive reconnaissance, which is almost undetectable, can yield a significant amount of information about the target organization and its users.

Active reconnaissance builds on the results of open-source intelligence and passive reconnaissance, and focuses on using probes to identify the path to the target and the exposed attack surface of the target. In general, complex systems have a greater attack surface, and each surface may be exploited and then leveraged to support additional attacks.

Although active reconnaissance produces more information, and more useful information, interactions with the target system may be logged, triggering alarms by protective devices, such as firewalls and intrusion detection systems. As the usefulness of the data to the attacker increases, so does the risk of detection; this is shown in the following diagram:

Active Reconnaissance and Vulnerability Scanning

To improve the effectiveness of active reconnaissance in providing detailed information, our focus will be on using stealthy, or difficult to detect, techniques.

In this chapter, you will learn:

  • Stealth scanning strategies
  • Network infrastructure, host discovery, and enumeration
  • Comprehensive reconnaissance applications, especially recon-ng
  • Targeted vulnerability scanning
主站蜘蛛池模板: 中西区| 南华县| 津南区| 措美县| 洛浦县| 山丹县| 临漳县| 青海省| 汕头市| 新乡县| 阜新| 碌曲县| 德庆县| 东台市| 苏尼特右旗| 青阳县| 西乌珠穆沁旗| 宁蒗| 凌云县| 历史| 岚皋县| 定西市| 海城市| 乳山市| 嘉鱼县| 焉耆| 永吉县| 屏南县| 鸡西市| 黄大仙区| 满洲里市| 元谋县| 海南省| 北海市| 道孚县| 江北区| 皋兰县| 瑞丽市| 怀集县| 新巴尔虎右旗| 通州市|