Content deleted Content added
wikil |
use cite templ |
||
Line 6:
Malicious (or "[[Black hat hacking|black-hat]]") hackers can, on entry of the network, get to security sensitive information or corrupt the network making it useless. If this network belonged to a company which used this network on a regular basis, the company would lose the function to send information internally to other departments.
Network enumerators are often used by [[script kiddies]] for ease of use, as well as by more experienced hackers in cooperation with other programs/manual lookups. Also, [[whois]] queries, [[zone transfer]]s, [[ping sweep]]s and [[traceroute]] can be performed. <ref>
==Popular open source network enumerators==
Line 18:
{{reflist}}
*[http://events.ccc.de/congress/2011/Fahrplan/attachments/2024_Dont_scan_just_ask_Fabian_Mihailowitsch.pdf Identifying Web Applications] by Fabian Mihailowitsch
[[Category:Hacking (computer security)]]
|