Post-Connection Attacks

In all the attacks that we performed in the previous chapters, we weren't connected to a network. In this chapter, however, we are going to look at attacks that we can perform when we break through the network. Firstly, we are going to learn about all the important information we can gather when we enter a network that will help us to launch attacks; we will be using a netdiscover tool for this purpose. We will also learn about a tool that is similar to netdiscover—namely, AutoScan. This has a better interface and is more powerful than netdiscover. We will learn about yet another tool called Zenmap, which works in a similar fashion to the way AutoScan and netdiscover explore all the clients that are connected to a system.

In this chapter, we will cover the following topic:

  • Post-connection attacks
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.191.102.112