O'Reilly logo

Conducting Network Penetration and Espionage in a Global Environment by Bruce Middleton

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

4

Direct Target Information Acquisition (DTIA)

Target Discovery

Now we are actually going to touch the target. This means we are going to be in contact with the contact system, and the more noise we make on the target system, the higher the probability that someone will discover our presence. So if you are concerned about someone detecting and responding to your presence on a target, then be as quiet as you possibly can. You’ll have to use your own judgment as to just how noisy you can be, depending on the circumstances of your particular engagement.

Ping

#ping -c 2 <target>

Some options that can be useful:

-c N where N is the number of pings you send

  • The more you send, the more likely you are to be discovered.

-n Print IP addresses in the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required