What is this process known as?

You are attempting to map out the firewall policy for an organization. You discover your target
system is one hop beyond the firewall. Using hping2, you send SYN packets with the exact TTL of
the target system starting at port 1 and going up to port 1024. What is this process known as?

You are attempting to map out the firewall policy for an organization. You discover your target
system is one hop beyond the firewall. Using hping2, you send SYN packets with the exact TTL of
the target system starting at port 1 and going up to port 1024. What is this process known as?

A.
Footprinting

B.
Firewalking

C.
Enumeration

D.
Idle scanning

Explanation:
Firewalking uses a traceroute-like IP packet analysis to determine whether or not a
particular packet can pass from the attacker’s host to a destination host through a packet-filtering
device. This technique can be used to map ‘open’ or ‘pass through’ ports on a gateway. More
over,it can determine whether packets with various control information can pass through a given
gateway.



Leave a Reply 0

Your email address will not be published. Required fields are marked *