There are many ways to discover the topology of a targeted network - and form a good picture of the network.
Eg. using ICMP host sweep, traceroute, SNMP, port scanning, tcp port sweep, udp port sweep, dns query, arp request, and other reconnaissance tools and protocols to produce a "good map".
Not true you require insider(s) or 内鬼 to do it.
That is why IT intrusion is a very scary things - as you send "scout", "drones" or "spy" - virtually in a virtual domain - at the comfort anywhere - as long as there are internet access.
The catch is - whether anyone "discover" or is "alerted" to what you are doing while you are quietly doing reconnaissance.
A good secured and defense IT system can detect any attacks - when it correlate abnormal or illegal activities - and send alarms that the network is under attack.
No comments:
Post a Comment