June 2017
Intermediate to advanced
510 pages
11h 35m
English
The most common approach to active reconnaissance is to conduct a scan against the target, send defined packets to the target, and then use the returned packets to gain information. The most popular tool for this is Network Mapper (nmap).
To use nmap effectively, it must be run with root-level privileges. This is typical of applications that manipulate packets, which is why Kali defaults to root at startup.
Some stealth techniques to avoid detection and subsequent alarms include the following:
Read now
Unlock full access