How it works...

ICMP traffic might seem to be an unintuitive way of verifying the exploitability of target systems. However, it actually works very well. The single ICMP echo request leaves no trace of exploitation on the target system, and no excessive overhead is required. Also, the custom TTL value of 15 makes it highly unlikely that a false positive will be generated since nearly all systems begin with a TTL value of 128 or higher.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset