官术网_书友最值得收藏!

Stealth scanning strategies

The greatest risk involved in active reconnaissance is being discovered by the target. Using the tester's time and data stamps, the source IP address, and additional information, the target can identify the source of the incoming reconnaissance. Therefore, stealth techniques are employed to minimize the chances of being detected.

When employing stealth to support reconnaissance, a tester mimicking the actions of a hacker will do the following:

  • Camouflage tool signatures to avoid detection or triggering an alarm
  • Hide the attack within legitimate traffic
  • Modify the attack to hide the source and type of traffic
  • Make the attack invisible using nonstandard traffic types or encryption

Stealth scanning techniques can include some or all of the following:

  • Adjusting the source IP stack and tool identification settings
  • Modifying packet parameters (nmap)
  • Using proxies with anonymity networks (ProxyChains and the Tor network)
主站蜘蛛池模板: 陆川县| 固始县| 张北县| 彭阳县| 班戈县| 鄯善县| 合肥市| 布拖县| 商洛市| 柯坪县| 丹寨县| 宁阳县| 开原市| 昌都县| 特克斯县| 武鸣县| 舟山市| 黄大仙区| 江口县| 聂拉木县| 万州区| 东方市| 甘孜| 修武县| 台东市| 昂仁县| 信阳市| 化德县| 杂多县| 张家口市| 南靖县| 西吉县| 宜州市| 全南县| 罗定市| 多伦县| 永城市| 南平市| 达州市| 万州区| 蒲江县|