Identifying the target machine
The tools included in this category are used to identify target machines that are available. However, first we need to know our client's terms and agreements. If the agreements require us to hide pentesting activities, then we need to conceal our penetration testing activities. Stealth technique may also be applied for testing Intrusion Detection System (IDS) or Intrusion Prevention System (IPS) functionality. If there are no such requirements, we may not need to conceal our penetration testing activities.
ping
The ping
tool is the most famous tool to check whether a particular host is available. The ping
tool works by sending an ICMP (Internet Control Message Protocol) ECHO REQUEST packet to the target host. If the ...
Get BackTrack 4: Assuring Security by Penetration Testing now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.