官术网_书友最值得收藏!

Identifying the external network infrastructure

Once the tester's identity is protected, identifying the devices on the internet-accessible portion of the network is the next critical step in scanning a network.

Attackers and penetration testers use this information to do the following:

  • Identify devices that may confuse (load balancers) or eliminate (firewalls and packet inspection devices) test results
  • Identify devices with known vulnerabilities
  • Identify the requirement for continuing to implement stealthy scans
  • Gain an understanding of the target's focus on secure architecture and on security in general

traceroute provides basic information on packet filtering abilities; some other applications on Kali include the following:

The following screenshot shows the results obtained from running the lbd script against Facebook; as you can see, Google uses both DNS-Loadbalancing and HTTP-Loadbalancing on its site. From a penetration tester's perspective, this information could be used to explain why spurious results are obtained, as the load balancer shifts a particular tool's activity from one server to another:

主站蜘蛛池模板: 安塞县| 和平县| 金秀| 溧水县| 肥东县| 广东省| 绥滨县| 宜宾县| 贵溪市| 垦利县| 牙克石市| 孟村| 巴青县| 富锦市| 安仁县| 井研县| 新兴县| 莱西市| 莱阳市| 陆丰市| 清远市| 凤冈县| 盘锦市| 宜宾市| 息烽县| 洛南县| 城口县| 泾源县| 如皋市| 阿尔山市| 伊宁县| 防城港市| 怀安县| 鸡东县| 汝南县| 壤塘县| 静宁县| 乡城县| 武穴市| 天全县| 延寿县|