Zombie Scanning

It is possible to identify the  open ports on a target system without ever  giving that system any indication that you interacted with it. This extremely stealthy form of scanning is referred to as zombie scanning and can only be performed if another system exists on the network that has low network activity and incremental IPID sequencing.


Popular posts from this blog

Byobu : Japanese term for decorative