- Mastering Kali Linux for Advanced Penetration Testing(Second Edition)
- Vijay Kumar Velu
- 317字
- 2021-07-02 21:04:19
Modifying packet parameters
The most common approach to active reconnaissance is to conduct a scan against the target, send defined packets to the target, and then use the returned packets to gain information. The most popular tool for this is Network Mapper (nmap).
To use nmap effectively, it must be run with root-level privileges. This is typical of applications that manipulate packets, which is why Kali defaults to root at startup.
Some stealth techniques to avoid detection and subsequent alarms include the following:
- Attackers approach the target with a goal in mind and send the minimum number of packets needed to determine the objective. For example, if you wish to confirm the presence of a web host, you first need to determine whether port 80, the default port for web-based services, is open.
- Avoid scans that may connect with the target system and leak data. Do not ping the target or use synchronize (SYN) and nonconventional packet scans, such as acknowledge (ACK), finished (FIN), and reset (RST) packets.
- Randomize or spoof packet settings, such as the source IP and port address, and the MAC address.
- Adjust the timing to slow the arrival of packets at the target site.
- Change the packet size by fragmenting packets or appending random data to confuse packet inspection devices.
For example, if you want to conduct a stealthy scan and minimize detection, the following nmap command could be used:
#nmap --spoof-mac Cisco --data-length 24 -T paranoid --max-hostgroup 1 --max-parallelism 10 -Pn -f -D 10.1.20.5,RND:5,ME -v -n -sS -sV -oA /desktop/pentest/nmap/out -p T:1-1024 --randomize-hosts 10.1.1.10 10.1.1.15
The following table explains the previous command in detail:

Together, these options will create a very slow scan that hides the true identity of the source. However, if the packets are too unusual, complex modification may actually attract the attention of the target; therefore, many testers and attackers use anonymity networks to minimize the chances of detection.
- 新編Visual Basic程序設計上機實驗教程
- C語言程序設計(第3版)
- Oracle 11g從入門到精通(第2版) (軟件開發視頻大講堂)
- OpenCV實例精解
- Software Testing using Visual Studio 2012
- Oracle 12c中文版數據庫管理、應用與開發實踐教程 (清華電腦學堂)
- MySQL 8 DBA基礎教程
- OpenCV 3和Qt5計算機視覺應用開發
- Elasticsearch for Hadoop
- HTML5從入門到精通 (第2版)
- Python算法指南:程序員經典算法分析與實現
- Python3.5從零開始學
- Learning Nessus for Penetration Testing
- Android 游戲開發大全(第二版)
- Java Web開發教程:基于Struts2+Hibernate+Spring