You are attempting to map out the firewall policy for an organization. You discover your target system is one hop beyond the firewall. Using hping2, you send SYN packets with the exact TTL of the target system starting at port 1 and going up to port 1024. What is this process known as?
A.
Footprinting
B.
Firewalking
C.
Enumeration
D.
Idle scanning
Explanation:
Firewalking uses a traceroute-like IP packet analysis to determine whether or not a particular packet can pass from the attacker’s host to a destination host through a packet-filtering device. This technique can be used to map `open’ or `pass through’ ports on a gateway. More over, it can determine whether packets with various control information can pass through a given gateway.