Are scripts coded only using the default API of a high level, interpreted language for generic and meticulous gathering of network device & host software information that are already available through common network security applications able to go unnoticed at times that common network security applications would set off alarms from packet inspection?
|
A packet is a packet is a packet. There is no difference no matter how you generate it, be it using a tool like scapy or using a scripting language like Python or Ruby. What matters is the frequency and contents of the packets you are sending out. For example, a IDS might get suspicious if you are hitting the system with multiple Of course, a tool like |
|||||
|