![]() ![]() In this scenario I will show you how an adversary can get a network scan of the IP address range without even sending one SYN packet like with normal port scanners. There is always a possibility of an intrusion detection system monitoring the network so obfuscating the network scan could be the factor in not getting detected or leaving obvious digital forensics. When an attacker has gained access to a private network the next goal is to look around the network to see what is on it.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |