Scanning and Evasion Techniques

In this chapter, we will describe the process of discovering devices on a target network using various tools in Kali Linux, as well as other tools available from GitHub. We will be looking into the following topics:

  • A description of the target-discovery process
  • The method used to identify target machines using the tools in Kali Linux
  • The steps required to find the operating systems of the target machines (operating system fingerprinting)
  • Automated scanning with Striker
  • Anonymization with Nipe

To help you understand these concepts easily, we will use a virtual network as the target network.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.219.86.155