O'Reilly logo

BackTrack 4: Assuring Security by Penetration Testing by Shakeel Ali, Tedi Heriyanto

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

In this chapter, we discussed the target discovery process. We started by discussing the purpose of target discovery: identifying the target machine and finding out the operating system used by the target machine. Then we continued with BackTrack tools that can be used for identifying target machines. The tools discussed are ping, arping, arping2, fping, genlist, hping2, hping3, lanmap, nbtscan, nping, and onesixtyone.

At the end of this chapter you learned about the tools that can be used to do OS fingerprinting p0f and xprobe2.

In the next chapter, we will talk about target enumeration.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required