Flashcards in Lesson 1 Deck (4)
Loading flashcards...
1
Random Scanning
Each compromised computer probes
random addresses.
2
Permutation Scanning
All compromised computers share a
common pseudo-random permutation of the
IP address space.
3
Signpost Scanning
Uses the communication patterns of the
compromised computer to find new target.
4