Lesson 1 Flashcards
(4 cards)
1
Q
Random Scanning
A
Each compromised computer probes
random addresses.
2
Q
Permutation Scanning
A
All compromised computers share a
common pseudo-random permutation of the
IP address space.
3
Q
Signpost Scanning
A
Uses the communication patterns of the
compromised computer to find new target.
4
Q
Hitlist Scanning
A
A portion of a list of targets is supplied to
a compromised computer.