- Mastering Kali Linux for Advanced Penetration Testing(Second Edition)
- Vijay Kumar Velu
- 161字
- 2021-07-02 21:04:21
Identifying the external network infrastructure
Once the tester's identity is protected, identifying the devices on the internet-accessible portion of the network is the next critical step in scanning a network.
Attackers and penetration testers use this information to do the following:
- Identify devices that may confuse (load balancers) or eliminate (firewalls and packet inspection devices) test results
- Identify devices with known vulnerabilities
- Identify the requirement for continuing to implement stealthy scans
- Gain an understanding of the target's focus on secure architecture and on security in general
traceroute provides basic information on packet filtering abilities; some other applications on Kali include the following:

The following screenshot shows the results obtained from running the lbd script against Facebook; as you can see, Google uses both DNS-Loadbalancing and HTTP-Loadbalancing on its site. From a penetration tester's perspective, this information could be used to explain why spurious results are obtained, as the load balancer shifts a particular tool's activity from one server to another:

推薦閱讀
- Django+Vue.js商城項目實戰
- 深入淺出Electron:原理、工程與實踐
- Building a Home Security System with Raspberry Pi
- FFmpeg入門詳解:音視頻流媒體播放器原理及應用
- OpenStack Cloud Computing Cookbook(Fourth Edition)
- The Data Visualization Workshop
- Kinect for Windows SDK Programming Guide
- 從Excel到Python:用Python輕松處理Excel數據(第2版)
- Java EE 8 Application Development
- Getting Started with Hazelcast(Second Edition)
- Python數據可視化之美:專業圖表繪制指南(全彩)
- Visual Basic語言程序設計上機指導與練習(第3版)
- Learning TypeScript
- 詩意的邊緣
- Learning Gerrit Code Review