Network Reconnaissance and Discovery
Command-line tools are used every day by security professionals for network discovery and reconnaissance. Therefore, for the Security+ exam, you must be familiar with them, and so I have provided a screenshot for many of them. We are going to see when we would use each of them in turn:
- Fingerprinting: This is the process of capturing your network traffic, and mapping all of the network devices, protocols, and IP address ranges so that they have information that will help an attacker get an idea of how your network is laid out.
- Footprinting: This is looking at the network topology and gathering as much information as you can, such as email addresses. They will identify vulnerabilities within a company that can be used as an attack vector.
- Internet Control Message Protocol (ICMP): ICMP brings back the replies when you use command-line tools. Therefore, if you block incoming ICMP connections on the network firewall, none of the tools...