![Mastering Kali Linux for Advanced Penetration Testing(Second Edition)](https://wfqqreader-1252317822.image.myqcloud.com/cover/17/36701017/b_36701017.jpg)
上QQ阅读APP看书,第一时间看更新
Identifying the external network infrastructure
Once the tester's identity is protected, identifying the devices on the internet-accessible portion of the network is the next critical step in scanning a network.
Attackers and penetration testers use this information to do the following:
- Identify devices that may confuse (load balancers) or eliminate (firewalls and packet inspection devices) test results
- Identify devices with known vulnerabilities
- Identify the requirement for continuing to implement stealthy scans
- Gain an understanding of the target's focus on secure architecture and on security in general
traceroute provides basic information on packet filtering abilities; some other applications on Kali include the following:
![](https://epubservercos.yuewen.com/484EEB/19470407201635606/epubprivate/OEBPS/Images/7.jpg?sign=1739331949-4shRMbzq2gQ41pEkjxIGSOrMh8XeBbTv-0-6cbe73c4471b8ecf20fb806ff7786ad9)
The following screenshot shows the results obtained from running the lbd script against Facebook; as you can see, Google uses both DNS-Loadbalancing and HTTP-Loadbalancing on its site. From a penetration tester's perspective, this information could be used to explain why spurious results are obtained, as the load balancer shifts a particular tool's activity from one server to another:
![](https://epubservercos.yuewen.com/484EEB/19470407201635606/epubprivate/OEBPS/Images/e5f59676-1865-42e4-b6f4-f92cc86893f5.png?sign=1739331949-xeqkbAkathCr0TGm6lf2w8Pa8z15sNen-0-bd3b4bb574e8b03d3fb3a346ef7cd6ee)