首页> 外文会议>International Conference on Computing, Mathematics and Engineering Technologies >Penetration Testing Active Reconnaissance Phase – Optimized Port Scanning With Nmap Tool
【24h】

Penetration Testing Active Reconnaissance Phase – Optimized Port Scanning With Nmap Tool

机译:渗透测试活动侦察阶段–使用Nmap工具优化端口扫描

获取原文
获取外文期刊封面目录资料

摘要

Reconnaissance might be the longest phase, sometimes take weeks or months. The black hat makes use of passive information gathering techniques. Once the attacker has sufficient statistics, then the attacker starts the technique of scanning perimeter and internal network devices seeking out open ports and related services. In this paper we are showing traffic accountability and time to complete the specific task during reconnaissance phase active scanning with nmap tool and proposed strategies that how to deal with large volumes of hosts and conserve network traffic as well as time of the specific task.
机译:侦察可能是最长的阶段,有时需要数周或数月。黑帽利用被动信息收集技术。一旦攻击者有了足够的统计信息,攻击者便开始扫描外围和内部网络设备以寻找开放端口和相关服务的技术。在本文中,我们显示了流量问责制和完成侦查阶段在使用nmap工具进行主动扫描期间完成特定任务的时间,并提出了如何处理大量主机并节省网络流量以及特定任务时间的策略。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号