- Network Scanning Cookbook
- Sairam Jetty
- 198字
- 2021-08-13 15:14:19
Complexity
Today's network environments have a complex structure consisting of firewalls, DMZ, and network devices such as switches and routers. These devices consist of complex access lists and virtual network configurations, which makes it difficult to generalize any activity. A shift in any of the preceding configurations could result in a change of the architecture of the whole network.
If we are looking to perform an IP-based scan on any of the network components, we have to be sure that all the data packets generated are reaching the destination intact and are not being impacted by any of the devices or solutions in between. For example, if Alice is scanning Bob's computer over the network and both of them are separated by a firewall, where Bob's subnet is configured to be in WAN Ping Block Mode as a part of which ping packets will be identified and dropped at the firewall level, Alice's host discovery scans for Bob's computer will result in a false positive that machine is not live.
In order to perform a successful security profiling using a Network Vulnerability Scan, the following factors need to be considered:
- Scope of the scan
- Network architecture
- Network access
- Kaldi語音識別實戰(zhàn)
- 電子產(chǎn)品調(diào)試技能上崗實訓(xùn)
- 5G技術(shù)與應(yīng)用
- 輕松認(rèn)識無線電
- 物聯(lián)網(wǎng)在中國的探索與實踐
- 常用電子元器件識別/檢測/選用一讀通(第2版)
- 光傳輸網(wǎng)絡(luò)技術(shù):SDH與DWDM(第2版)
- 基于Multisim的電子系統(tǒng)設(shè)計、仿真與綜合應(yīng)用(第2版)
- 數(shù)字視頻制作實務(wù)
- IMS技術(shù)行業(yè)專網(wǎng)應(yīng)用
- 怎樣識讀電子電路圖
- 傳感器與檢測技術(shù)(第3版)
- 認(rèn)識光通信
- 網(wǎng)絡(luò)融合環(huán)境下寬帶接入技術(shù)與應(yīng)用
- 交換機(jī)與路由器配置項目式教程