上QQ阅读APP看书,第一时间看更新
Chapter 2. Network Exploration
Note
This chapter shows you how to do some things that in many situations might be illegal, unethical, a violation of the terms of service, or just not a good idea. It is provided here to give you information that may be of use to protect yourself against threats and make your own system more secure. Before following these instructions, be sure you are on the right side of the legal and ethical line... use your powers for good!
In this chapter, we will cover:
- Discovering hosts with TCP SYN ping scans
- Discovering hosts with TCP ACK ping scans
- Discovering hosts with UDP ping scans
- Discovering hosts with ICMP ping scans
- Discovering hosts with IP protocol ping scans
- Discovering hosts with ARP ping scans
- Discovering hosts using broadcast pings
- Hiding our traffic with additional random data
- Forcing DNS resolution
- Excluding hosts from your scans
- Scanning IPv6 addresses
- Gathering network information with broadcast scripts