Using evasion techniques
When a device such as a computer sends a packet to a network, the sender’s IP and MAC addresses are inserted into the packet header. As such, when ethical hackers perform host discovery on a network, their IP and MAC addresses are also included within each packet from their machine to the targeted hosts. Ethical hackers and penetration testers always try to remain undetected during security assessments, as part of simulating real-world cyberattacks on an organization’s network infrastructure.
There are various evasion techniques that can be used during host discovery to reduce the risk of being detected and traced by threat detection systems and the security team of a target. To get started, please use the following instructions:
- Power on both the Kali Linux and Metasploitable 3 virtual machines. Ensure you’re logged in to Kali Linux.
- Ensure you identify the IP address of Metasploitable 3, as this virtual machine will be...