![]() The target system interacts with the " zombie" computer and difference in behavior can be observed using different "zombies" with evidence of different privileges granted by the target to different computers. This exploit functions with two purposes, as a port scanner and a mapper of trusted IP relationships between machines. The attack is sophisticated because there is no interaction between the attacker computer and the target: the attacker interacts only with the " zombie" computer. ![]() The attack involves sending forged packets to a specific machine target in an effort to find distinct characteristics of another zombie machine. This action can be done through common software network utilities such as nmap and hping. This could be an idle computer, called a " zombie". ![]() This is accomplished by impersonating another computer whose network traffic is very slow or nonexistent (that is, not transmitting or receiving information). The idle scan is a TCP port scan method that consists of sending spoofed packets to a computer to find out what services are available.
0 Comments
Leave a Reply. |