官术网_书友最值得收藏!

Active Reconnaissance of External and Internal Networks

The main goal of the active reconnaissance phase is to collect and weaponize the information about the target as much as possible in order to facilitate the exploitation phase of the kill chain methodology.

We have seen how to perform passive reconnaissance using OSINT, which is almost undetectable, and can yield a significant amount of information about the target organization and its users.

Active reconnaissance builds on the results of OSINT and passive reconnaissance, and emphasizes more focused probes to identify the path to the target and the exposed attack surface of the target. In general, complex systems have a greater attack surface, and each surface may be exploited and then leveraged to support additional attacks.

Although active reconnaissance produces more useful information, interactions with the target system may be logged, triggering alarms by protective devices, such as firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems (IPS).

As the usefulness of the data to the attacker increases, so does the risk of detection; this is shown in the following diagram:

To improve the effectiveness of active reconnaissance in providing detailed information, our focus will be on using stealthy, or difficult to detect, techniques.

In this chapter, you will learn about the following topics:

  • Stealth scanning strategies
  • External and internal infrastructure, host discovery, and enumeration
  • The comprehensive reconnaissance of applications, especially using recon-ng
  • The enumeration of internal hosts using DHCP
  • Useful Microsoft Windows commands for penetration testing
  • Taking advantage of default configurations
主站蜘蛛池模板: 沂源县| 临清市| 莎车县| 汶上县| 剑川县| 拉萨市| 资中县| 南皮县| 华阴市| 昌吉市| 磐安县| 台山市| 宁海县| 寻甸| 湘潭市| 化州市| 邓州市| 长泰县| 枞阳县| 濮阳市| 西宁市| 漳州市| 临漳县| 四会市| 垫江县| 博乐市| 瑞金市| 大余县| 无棣县| 陆川县| 麻城市| 临沧市| 东山县| 宜兴市| 恩平市| 叙永县| 融水| 卓尼县| 吴忠市| 义马市| 鄢陵县|