Vulnerability Scanner - Network Reconnaissance

Network Reconnaissance

Part of the server log, showing attempts to find the administration page.
220.128.235.XXX - - "GET /db/db/main.php HTTP/1.0" 404 - "-" "-" 220.128.235.XXX - - "GET /db/myadmin/main.php HTTP/1.0" 404 - "-" "-" 220.128.235.XXX - - "GET /db/webadmin/main.php HTTP/1.0" 404 - "-" "-" 220.128.235.XXX - - "GET /db/dbweb/main.php HTTP/1.0" 404 - "-" "-" 220.128.235.XXX - - "GET /db/websql/main.php HTTP/1.0" 404 - "-" "-" 220.128.235.XXX - - "GET /db/webdb/main.php HTTP/1.0" 404 - "-" "-" 220.128.235.XXX - - "GET /db/dbadmin/main.php HTTP/1.0" 404 - "-" "-" 220.128.235.XXX - - "GET /db/db-admin/main.php HTTP/1.0" 404 - "-" "-" 220.128.235.XXX - - "GET /db/phpmyadmin2/main.php HTTP/1.0" 404 - "-" "-" 220.128.235.XXX - - "GET /db/phpMyAdmin2/main.php HTTP/1.0" 404 - "-" "-" 220.128.235.XXX - - "GET /db/phpMyAdmin-2/main.php HTTP/1.0" 404 - "-" "-" 220.128.235.XXX - - "GET /db/php-my-admin/main.php HTTP/1.0" 404 - "-" "-" 220.128.235.XXX - - "GET /db/phpMyAdmin-2.2.3/main.php HTTP/1.0" 404 - "-" "-" 220.128.235.XXX - - "GET /db/phpMyAdmin-2.2.6/main.php HTTP/1.0" 404 - "-" "-" 220.128.235.XXX - - "GET /db/phpMyAdmin-2.5.1/main.php HTTP/1.0" 404 - "-" "-" 220.128.235.XXX - - "GET /db/phpMyAdmin-2.5.4/main.php HTTP/1.0" 404 - "-" "-" (..)

A vulnerability scanner can be used to conduct network reconnaissance, which is typically carried out by a remote attacker attempting to gain information or access to a network on which it is not authorized or allowed. Network reconnaissance is increasingly used to exploit network standards and automated communication methods. The aim is to determine what types of computers are present, along with additional information about those computers—such as the type and version of the operating system. This information can be analyzed for known or recently discovered vulnerabilities that can be exploited to gain access to secure networks and computers. Network reconnaissance is possibly one of the most common applications of passive data analysis. Early generation techniques, such as TCP/IP passive fingerprinting, have accuracy issues that tended to make it ineffective. Today, numerous tools exist to make reconnaissance easier and more effective.

Read more about this topic:  Vulnerability Scanner

Famous quotes containing the word network:

    How have I been able to live so long outside Nature without identifying myself with it? Everything lives, moves, everything corresponds; the magnetic rays, emanating either from myself or from others, cross the limitless chain of created things unimpeded; it is a transparent network that covers the world, and its slender threads communicate themselves by degrees to the planets and stars. Captive now upon earth, I commune with the chorus of the stars who share in my joys and sorrows.
    Gérard De Nerval (1808–1855)