![Mastering Kali Linux for Advanced Penetration Testing(Second Edition)](https://wfqqreader-1252317822.image.myqcloud.com/cover/17/36701017/b_36701017.jpg)
上QQ阅读APP看书,第一时间看更新
Identifying the external network infrastructure
Once the tester's identity is protected, identifying the devices on the internet-accessible portion of the network is the next critical step in scanning a network.
Attackers and penetration testers use this information to do the following:
- Identify devices that may confuse (load balancers) or eliminate (firewalls and packet inspection devices) test results
- Identify devices with known vulnerabilities
- Identify the requirement for continuing to implement stealthy scans
- Gain an understanding of the target's focus on secure architecture and on security in general
traceroute provides basic information on packet filtering abilities; some other applications on Kali include the following:
![](https://epubservercos.yuewen.com/484EEB/19470407201635606/epubprivate/OEBPS/Images/7.jpg?sign=1738906166-k3LgfvCOma5zk7XPivah4oEL0rFwDpT5-0-a7dffffcd8059d55bde012ab68ed7a49)
The following screenshot shows the results obtained from running the lbd script against Facebook; as you can see, Google uses both DNS-Loadbalancing and HTTP-Loadbalancing on its site. From a penetration tester's perspective, this information could be used to explain why spurious results are obtained, as the load balancer shifts a particular tool's activity from one server to another:
![](https://epubservercos.yuewen.com/484EEB/19470407201635606/epubprivate/OEBPS/Images/e5f59676-1865-42e4-b6f4-f92cc86893f5.png?sign=1738906166-5UhT2oli9tdOU4sFRHlEdtF0bPJqcIQs-0-64e5885909c0052bf92a33c85b801ccf)