02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

120 Chapter 5 ■ Scanning Networks<br />

Network mappers combine the scanning and sweeping techniques explained in this chapter<br />

to build a complete picture. Keep in mind that mappers can easily reveal the presence of<br />

the ethical hacker on the network due to the traffic that they generate, so mappers should<br />

be used sparingly to avoid detection. Figure 5.7 shows the results of a network mapper<br />

in action.<br />

FIGURE 5.7 A network map built by a network-mapping software package<br />

Using Proxies<br />

The last topic that needs to be discussed as far as successful scanning is concerned is the<br />

use of proxies. A proxy is a system acting as a stand-in between the scanner and the target.<br />

The proxy acts as an agent for the scanning party, thus providing a degree of anonymity<br />

for the scanning party. Proxy servers can perform several functions, including:<br />

■ Filtering traffic in and out of the network<br />

■ Anonymizing web traffic<br />

■ Providing a layer of protection between the outside world and the internal network

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!