The tools included in this category are used to identify target machines that are available. However, first we need to know our client's terms and agreements. If the agreements require us to hide pentesting activities, then we need to conceal our penetration testing activities. Stealth technique may also be applied for testing Intrusion Detection System (IDS) or Intrusion Prevention System (IPS) functionality. If there are no such requirements, we may not need to conceal our penetration testing activities.
ping tool is the most famous tool to check whether a particular host is available. The
ping tool works by sending an ICMP (Internet Control Message Protocol) ECHO REQUEST packet to the target host. If the ...