Content deleted Content added
use cite templ |
wikil |
||
Line 6:
Malicious (or "[[Black hat hacking|black-hat]]") hackers can, on entry of the network, get to security sensitive information or corrupt the network making it useless. If this network belonged to a company which used this network on a regular basis, the company would lose the function to send information internally to other departments.
Network enumerators are often used by [[script kiddies]] for ease of use, as well as by more experienced hackers in cooperation with other programs/manual lookups. Also, [[whois]] queries, [[zone transfer]]s, [[ping sweep]]s and [[traceroute]] can be performed. <ref>{{cite web|url=http://www.informit.com/articles/article.aspx?p=25916|title=Security Through Penetration Testing: Internet Penetration|authors=Ajay Gupta, Thomas Klavinsky, and Scott Laliberte|work=InformIT|publisher=[[Pearson PLC]]|date=2002-03-15|accessdate=2013-03-31}}</ref>
==Popular open source network enumerators==
|