-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
Reconnaissance for Ethical Hackers
By :
As an ethical hacker who is performing OSINT operations, it’s important to ensure the target is not able to trace who is collecting data about them. Skilled cybersecurity and network professionals are able to capture and analyze the data found within network packets and logs to determine the source of the traffic; hence, it’s recommended to anonymize your network traffic while using the internet to mask your real geolocation and source public IP address.
The following are common techniques that are used to anonymize internet-based traffic:
The following sub-sections will describe the advantages and how each of the preceding technologies works to anonymize your internet-based traffic.
A VPN enables a user to establish a secure communication channel over an unsecure network, thus providing confidentiality and mitigating eavesdropping attacks over a network. VPNs are commonly used...
Change the font size
Change margin width
Change background colour