In Chapter 5, Wireless Pentesting, you saw the various network attacks and how to prevent them. In this chapter, you will see some proactive approaches. In Chapter 2, Scanning Pentesting, you learned about IP scanning using ping sweep and port scanning by using the TCP connect scan. But what happens when the ping-sweep and port-scanning codes give you fake targets? You would try to exploit the fake targets. The machine, which is set up to act as a decoy to lure attackers, records the maneuvers of the attacker. After seeing all the tricks and attacks, the admin can build a new strategy to harden the network. In this chapter, we will use Python code to accomplish the tasks.
In this chapter, we will learn about the following topics:
- Fake ARP reply
- Fake ping reply
- Fake port-scanning reply
- Fake OS-signature reply to nmap
- Fake web server...