Pivot recon

In order to launch a pivot attack against another system, the attacker needs standard recon information. This includes the IP address, ports that are open and services responding on the ports, the type and version of OS being used and maybe vulnerabilities that can be detected. This information can be collected in some cases simply through sniffing and passive analysis of data to provide identification and fingerprinting of targets. Probes that are sent in a slow and stealthy manner may not trigger defenses like IDS because they are often positioned to most conveniently watch traffic at the perimeter of the network.

Leave a Reply

You must be logged in to post a comment.