![]() ![]() ![]() Detecting the presence of a firewall or additional IP protocols.Network scanning activities can be as follows: It is written by Gordon “Fyodor” Lyon and is a popular tool of choice to perform network-based reconnaissance. One such popular tool is Nmap, short for Network Mapper. The tools required to perform network scanning are readily available and can be downloaded easily over the Internet. Network reconnaissance relates to the act of gathering information about the target’s network infrastructure, the devices that reside on the network, the platform used by such devices, and the ports opened on them, to ultimately come up with a brief network diagram of devices and then plan the attack accordingly. In this article by Piyush Verma, author of the book Wireshark Network Security, you will be introduced to using Wireshark to detect network reconnaissance activities performed by an insider.Ī dictionary definition of reconnaissance is “military observation of a region to locate an enemy or ascertain strategic features.” A good analogy for reconnaissance will be a thief studying the neighborhood to observe which houses are empty and which are occupied, the number of family members who live at the occupied houses, their entrance points, the time during which these occupied houses are empty, and so on, before he/she can even think about stealing anything from that neighborhood. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
May 2023
Categories |