Automated Scanning Techniques

Many automated scanning techniques implemented in bots can infect unsecured operating systems. They automatically scan entire, or specific, Internet IP address ranges for vulnerable service versions or try to access services by brute-forcing login credentials. This appendix has already mentioned some ways to defend against brute-force attacks. Another line of defense is to disable the exposure of service versioning information and/ or to run services on nonstandard ports. Both techniques make reconnaissance a bit harder. This is not a mature security measure, but it is a relatively easy way to make a system invisible from automated (and only these kinds of) scan attempts.

Was this article helpful?

0 0
The Ultimate Computer Repair Guide

The Ultimate Computer Repair Guide

Read how to maintain and repair any desktop and laptop computer. This Ebook has articles with photos and videos that show detailed step by step pc repair and maintenance procedures. There are many links to online videos that explain how you can build, maintain, speed up, clean, and repair your computer yourself. Put the money that you were going to pay the PC Tech in your own pocket.

Get My Free Ebook

Post a comment