Target Discovery
This week we learnt about target discovery. This is a stage during the process of ethical hacking when the tester learns about their target. My tool of interest is nmap which can be used to find information about the operation system of the target so that the tester can exploit vulnerabilities of that OS to his advantage if any. Nmap fingerprints a system by:
Port Scanning- Provides a list of open TCP and UDP ports
ad-hoc forged packets sending
Analysis of the responses received and comparison against a database of known OS’s behavior (fingerprints).
Nmap in Use
To detect the OS of the target the command is nmap -O ipaddress/domainName. The example shows scanning the IP address 182.30.69.100 to get the OS
Leave a Reply