Identifying Active Machines
Once valid network ranges have been determined, the next step is to identify active nodes on the network. A node is any device that is connected to the network, including computers and devices that participate in network communication. This task can be accomplished in several ways:
-
Wardialing (a legacy technique that is rarely used today)
-
Wardriving and related activities
-
Pinging
-
Port scanning (both direct and indirect, as part of a larger scanning process)
Each of these methods offers different capabilities useful in detecting active nodes that should be further explored for vulnerabilities. To apply each of these techniques effectively, the attacker must clearly understand its strengths and weaknesses, ...
Get Ethical Hacking: Techniques, Tools, and Countermeasures, 4th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.