One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Lab Blog
Identifiant 8459248
Date de publication 2024-03-05 11:00:00 (vue: 2024-03-05 11:07:49)
Titre Explorer les techniques de découverte d'hôtes dans un réseau
Exploring host discovery techniques in a network
Texte The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  In a network assessment, one of the first tasks is to narrow down a large set of IP addresses to a list of active or interesting hosts. It\'s like trying to find specific houses in a big neighbourhood without knocking on every door. Scanning every possible connection of every single IP address can be slow and often unnecessary. What makes a host interesting depends on what you\'re looking for. For example, network administrators might only care about devices running specific services, while security experts might want to know about every device with an IP address. Imagine a scenario, where a network administrator wants to find all the computers in their office network. They might just want to send a quick signal (like a ping) to see if each computer responds. But if someone outside the network is testing security, they might try different tricks to avoid detection by firewalls and uncover every possible connection. Host discovery serves as the initial phase of network reconnaissance, laying the groundwork for subsequent analysis and exploitation. Host discovery refers to the technique used in a network assessment to find live hosts (online systems) and narrow down the scope of assessment to live hosts only in a network. In this article, we will delve into various ways to perform host discovery in a network using Nmap, netdiscover and angry ip scanner. For this exercise I have used a virtual local area network (LAN) network configured on my local system. The IP range I will use in this exercise is for my network. You have to find your IP before starting a scan for hosts in your LAN. I have used host only as network adapter in my virtual machines, but you can al
Envoyé Oui
Condensat ·scan           syntax: 0/24 1000 128 168 192 : this about ack active active/passive actively adapter adapter: address addresses adhere administrative administrator administrators adopt advised alive all allows along also alternative always analysis analysts angry any application are area arp article assessment at&t author avoid before below: best big but button can care check checked checks click command command netdiscover common compare complete computer computers configuration configured connection content corresponding cross default delve depending depends details detect detection determine device devices different discovered discovery does door down each echo edit emerges ending endorse entering enumeration every example exercise experts exploitation exploring find firewalls first friendly functions graphical groundwork group gui h in have help host hosts houses icmp identify image image: imagine including information initial initialisation initiate interesting interface intuitive its just kali knocking know lan large launch laws laying let’s levels like line linux linux: list listens live local look looking mac machine machine’s machines make makes mapping might more most moving much named narrow nat neighbourhood netdiscover netdiscover: network nmap nmap: not now offers office often once one online only open organizational other oui outside packets part passively pentests per perform performing performs phase ping platform policies port ports positions possible post privacy priviliges proceeding process provided quick quickly range range: reciprocating reconnaissance refers regulations replace requests require requirement responds responses responsibility results results: review running same scan scan: scanner scanner: scanning scenario scope search section security see seeking selecting send sending sends serves service services set should show shown signal simplifies single skill slow solely someone sort source specific specify start starting steps subsequent sudo sudoers support sure syn syntax: system systems table take taking target tasks tcp technique techniques terminal testing them those tool tools tricks try trying uncover unnecessary use used useful user users uses using utilised various vendor version very view views virtual want wants ways well what when where which will windows windows: without wlan you your zenmap
Tags Tool
Stories
Notes ★★★
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: