An ethical hacker is performing a network scan to evaluate the security of a company's IT infrastructure. During the scan, he discovers an active host with multiple open ports running various services. The hacker uses TCP communication flags to establish a connection with the host and starts communicating with it. He sends a SYN packet to a port on the host and receives a SYN/ACK packet back. He then sends an ACK packet for the received SYN/ACK packet, which triggers an open connection. Which of the following actions should the ethical hacker perform next?
agelbahri
3 weeks agoKalingaDev
3 months, 2 weeks agoblehbleh
4 months agoazdan
6 months, 4 weeks agokevin403
7 months, 2 weeks agoGK2205
8 months, 2 weeks agoTruth_Seeker
8 months, 3 weeks agoMustafaDDD
1 year, 1 month agoqwerty100
1 year, 1 month agoqtygbapjpesdayazko
1 year agoqwerty100
1 year, 1 month agoinsaniunt
1 year, 1 month agoxbsumz
1 year, 1 month ago