We have covered the requisite tools and techniques to perform ping sweeps ; TCP, UDP, and ICMP port scanning; and operating system detection. By using ping sweep tools, you can identify systems that are alive and pinpoint potential targets. By using a myriad of TCP and UDP scanning tools and techniques, you can identify potential services that are listening and make some assumptions about the level of exposure associated with each system. Finally, we demonstrated how attackers could use operating system detection software to determine with fine precision the specific operating system used by the target system. As we continue, you will see that the information collected thus far is critical to mounting a focused attack.

Hacking Exposed
Hacking Exposed 5th Edition
Year: 2003
Pages: 127
Similar book on Amazon © 2008-2017.
If you may any questions please contact us: