Quote:
Originally Posted by Jam1e
Custom port mapping isn't really anything more than obscurity. You're not really highlighting anything more than a pretty basic nmap scan and considering how noisy -A is. It's pretty obvious that any 'decent' IDS should be blocking that kind of noisy traffic. T4 is ridiculously fast and incredibly aggressive. This is basically a default scan which is making no attempt to be 'stealthy' - You should try using more custom scanning commands and see how solid that IDS really is.
"Hey there server, can you let me establish a connection with every port I can and can I also get the banner information so I can see what port, version you're running. Could you also engage the NSE so I can get all this juicy information".
1 could literally be the result of an IDS/firewall rules, the other could be out of the box as default as it gets.
|
i am sure with your articulate dialect and comprehensive reply, there is nothing beyond you jamie.Instead of this reply, lets see how good you are m8, to actually infiltrate these boundaries.Seems you are more than capable of doing so. Lets see some results m8, instead of this posting replies, using abreviations etc. Lets see a master at work.Not being funny, but with the cyber security, you are so forward to explain, surely you have the abilities of WarVox, who studied the same area of interest, to infiltrate these servers.!!!!