Chapter 5. Target Discovery

This chapter will help you understand the process of discovering machines on the target network using various tools from BackTrack. We will explain:

  • The description of target discovery
  • How to identify target machines using tools in BackTrack
  • How to find out the target machines' operating systems (operating system fingerprinting)

Introduction

After we collect information about our target network from third-party sources, such as the search engines, we need to discover our target machines. The purpose of this discovery process is:

  • To find out which machine in the target network is available to us. If the machine is not available, we can't continue the penetration testing process, and we need to move on to the next machine. ...

Get BackTrack 4: Assuring Security by Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.