Forum Thread: Camouflage Scanning Techniques

Camouflage Scanning Techniques

Hi I am working my way through the how-to lessons and am learning about recon.

My concern regarding active scanning is inadvertently sending any info from my source to the attack which could compromise my position.

For example i have read some of the tools such as metasploit can send tagging sequence numbers to the target which can trigger IDS systems. Also disabling IPv6 and DHCP is another step to bear in mind.

Basically I am trying to find out as many steps as possible to take to ensure as much safety as possible and to learn what steps you take before starting active recon?

Thanks in advance, cheers.

Sk4m

1 Response

Share Your Thoughts

  • Hot
  • Active