What is this process known as?

Posted by: Pdfprep Category: CEH-001 Tags: , ,

You are attempting to map out the firewall policy for an organization. You discover your target system is one hop beyond the firewall. Using hping2, you send SYN packets with the exact TTL of the target system starting at port 1 and going up to port 1024.

What is this process known as?
A . Footprinting
B . Firewalking
C . Enumeration
D . Idle scanning

Answer: B

Explanation:

Firewalking uses a traceroute-like IP packet analysis to determine whether or not a particular packet can pass from the attacker’s host to a destination host through a packet-filtering device. This technique can be used to map ‘open’ or ‘pass through’ ports on a gateway. More over, it can determine whether packets with various control information can pass through a given gateway.

Leave a Reply

Your email address will not be published.