Reconnaissance & Scanning. By Letian Li ISQS 6342 (Spring 2003) Professor John Durrett. Reconnaissance.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
By Letian Li
ISQS 6342 (Spring 2003)
Professor John Durrett
Complete the TCP three-way handshake.
Connect scans are really easy to detect.
The web server’s log file will indicate that a connection was opened from the attacker’s IP address.
Attackers often use stealthier scan techniques.