We have now taken a deep dive into active reconnaissance: attackers face a very real chance of their activities being identified, putting them at risk. Technically, this must be balanced against the need to map a network, find open ports, and determine the operating system and applications that are installed. The real challenge for attackers is to adopt stealthy scanning techniques in order to reduce the risks.
Manual approaches are normally used to create slow scans; however, these approaches may not always be effective. Therefore, attackers take advantage of tools such as the Tor network and various proxy applications to hide their identity.
In the next chapter, we will focus more on using the vulnerability assessment tools and techniques, how scanners identify vulnerabilities, and how to prepare for all the potential exploit candidates.