官术网_书友最值得收藏!

Mapping beyond the firewall

Attackers normally start network debugging using the traceroute utility, which attempts to map all the hosts on a route to a specific destination host or system. Once the target is reached, as the TTL field will be zero, the target will discard the datagram and generate an ICMP time exceeded packet back to its originator. A regular traceroute will be as follows:

As you can see from the preceding example, we cannot go beyond a particular IP, which most probably means that there is a packet filtering device at hop 4. Attackers would dig a little bit deeper to understand what is deployed on that IP.

Deploying the default UDP datagram option will increase the port number every time it sends an UDP datagram. Hence, attackers will start pointing a port number to reach the final target destination.

主站蜘蛛池模板: 凤翔县| 三都| 高淳县| 阿坝县| 通州市| 榆中县| 来凤县| 屏东县| 东乡县| 靖边县| 霞浦县| 嘉峪关市| 怀集县| 龙泉市| 林州市| 华池县| 长宁区| 周口市| 名山县| 定西市| 射洪县| 巩留县| 游戏| 广饶县| 阳西县| 芜湖县| 蚌埠市| 朝阳县| 高邮市| 玉龙| 汉源县| 郧西县| 旅游| 金寨县| 玉田县| 毕节市| 遂川县| 南开区| 石棉县| 乌审旗| 榆林市|