You are on page 1of 172
Module 03 Ethical Hacking and Countermeasures Exam 31250 Ceti Ethical Hacker Seanning Networks Scanning Networks TNE} Engineered by Hackers. Presented by Professionals. Ethical Hacking and Countermeasures v8 Module 03: Scanning Networks Exam 312-50 Module 03 Page 263, Exhcal Hacking and Counter ‘Al ighs Reserve ction is Strictly Prohibited. Ethical Hacking and Countermeasures Exam 31250 Ceti Ethical Hacker Seanning Networks Security News Saliently Sality Botnet Trapped Scanning IPv4 Address Space Source: htto://www.spamfighter.com A semi-famous botnet, Sality, used for locating vulnerable voice-over-IP (VoIP) servers has been controlled toward determining the entire IPv4 address space without setting off alerts, claims a new study, published by Paritynews.com, on October 10, 2012. Sality is a piece of malware with the primary aim of infecting web servers, dispersing spam, and stealing data. But the latest research has disclosed other purposes, including recognizing susceptible VoIP targets that could be used in toll fraud attacks. Through a method called "reverse-byte order scanning," Sality can be administered toward scanning possibly the whole IPv4 space, devoid of being recognized. That's the only reason the technique uses a very small number of packets that come from various sources. The selection of the target IP addresses develops in reverse-byte-order increments. Also, there are many bots contributing in the scan. The conclusion is that a solitary network would obtain scanning packets “diluted” over a huge period of time (12 days in this case, from various Module 03 Page 268 Ethical Hacking and Countermeasures Copyright © by EO-Counell ‘lights Reserved. Reproduction strictly Prohibited

You might also like