CEH

(Jeff_L) #1

120 Chapter 5 ■ Scanning Networks


Network mappers combine the scanning and sweeping techniques explained in this chapter
to build a complete picture. Keep in mind that mappers can easily reveal the presence of
the ethical hacker on the network due to the traffic that they generate, so mappers should
be used sparingly to avoid detection. Figure 5.7 shows the results of a network mapper
in action.

FIGURE 5.7 A network map built by a network-mapping software package

Using Proxies


The last topic that needs to be discussed as far as successful scanning is concerned is the
use of proxies. A proxy is a system acting as a stand-in between the scanner and the target.
The proxy acts as an agent for the scanning party, thus providing a degree of anonymity
for the scanning party. Proxy servers can perform several functions, including:
■ Filtering traffic in and out of the network
■ Anonymizing web traffic
■ Providing a layer of protection between the outside world and the internal network
Free download pdf