![Mastering Kali Linux for Advanced Penetration Testing(Second Edition)](https://wfqqreader-1252317822.image.myqcloud.com/cover/17/36701017/b_36701017.jpg)
上QQ阅读APP看书,第一时间看更新
Identifying the external network infrastructure
Once the tester's identity is protected, identifying the devices on the internet-accessible portion of the network is the next critical step in scanning a network.
Attackers and penetration testers use this information to do the following:
- Identify devices that may confuse (load balancers) or eliminate (firewalls and packet inspection devices) test results
- Identify devices with known vulnerabilities
- Identify the requirement for continuing to implement stealthy scans
- Gain an understanding of the target's focus on secure architecture and on security in general
traceroute provides basic information on packet filtering abilities; some other applications on Kali include the following:
![](https://epubservercos.yuewen.com/484EEB/19470407201635606/epubprivate/OEBPS/Images/7.jpg?sign=1739527553-6jYjxdKkt7q5Wy8ghNHqP83sfpSpGnl9-0-a1f256c51dff40e348a2b4dac6e164b1)
The following screenshot shows the results obtained from running the lbd script against Facebook; as you can see, Google uses both DNS-Loadbalancing and HTTP-Loadbalancing on its site. From a penetration tester's perspective, this information could be used to explain why spurious results are obtained, as the load balancer shifts a particular tool's activity from one server to another:
![](https://epubservercos.yuewen.com/484EEB/19470407201635606/epubprivate/OEBPS/Images/e5f59676-1865-42e4-b6f4-f92cc86893f5.png?sign=1739527553-Jyx3ie0silP1veG465DENaWovme0Tz4n-0-de26a714e9a82d3f30c4a091cb38069d)