Network Reconnaissance and Discovery
Command-line tools are used every day by security professionals for network discovery and reconnaissance. Therefore, for the Security+ exam, you must be familiar with them, and so I have provided a screenshot for many of them. We are going to see when we would use each of them in turn:
- Footprinting: This is the process of capturing your network traffic and mapping all of the network devices, protocols, and IP address ranges so that they have information that will help an attacker get an idea of how your network is laid out.
- Fingerprinting: This is looking at the network and gathering as much information as you can. It will identify hosts and their operating system, the patch level versions, and the vulnerabilities within a company that can be used as an attack vector. Nmap is a good tool to perform fingerprinting.
- Internet Control Message Protocol (ICMP): ICMP brings back the replies when you use command-line tools. Therefore, if...