Attack Phase 1: Reconnaissance

CS 493/693 Lecture, Dr. Lawlor, 2006/02/08

The first phase of any attack is to gather information about the targets:
Many tools gather together various steps; for example, nmap can do subnet scans and pings. 

Once a specific server and version is identified, there are a variety of exploits available--but luckily a well-run server is invulnerable to most of them.  "metasploit" is a scriptable collection of about a hundred common and not-so-common vulnerabilities, with a sophisticated encoder engine and a wide variety of targets, but you do have to identify the particular vulnerability to try--metasploit is not a scanner.