If I Was A Hacker

If I was a bad guy, and I probed a range of addresses, with a bogus connection attempt, I'd expect any one of 4 possible returns from each of the addresses probed.

  1. "Address unreachable" from the upstream gateway.
  2. "Connection refused" from the router or firewall.
  3. Reply from target, from an unstealthed computer or router.
  4. No response, from a stealthed computer or router.


If I were a true hacker (not a cracker or script kiddie), I think I'd prioritise my hack attempts based upon those results.

  1. "Address unreachable" = You can't hack what doesn't exist.
  2. "Connection refused" = Interesting, but there's so many responding that way.
  3. Reply from target = Boring.
  4. No response (stealth) = Now we're talking. A true challenge. Thinks he's invisible, eh?


I'd go after #4, then #2 and #3, in that order. Security By Obscurity = No Security.

>> Top

No comments:

Post a Comment

Welcome to Nitecruzr Dot Net, and PChuck's Network. If this is your first visit here, please help me to help you, and read my commenting policy. Please, don't post anonymously, asking questions that should be asked in my forum Nitecruzr Dot Net - Networking.