An ethical hacker is performing a network scan to evaluate the security of a company's IT infrastructure. During the scan, he discovers an active host with multiple open ports running various services. The hacker uses TCP communication flags to establish a connection with the host and starts communicating with it. He sends a SYN packet to a port on the host and receives a SYN/ACK packet back. He then sends an ACK packet for the received SYN/ACK packet, which triggers an open connection. Which of the following actions should the ethical hacker perform next?
azdan
2 months, 2 weeks agokevin403
3 months, 1 week agoGK2205
4 months agoTruth_Seeker
4 months, 1 week agoMustafaDDD
8 months, 4 weeks agoqwerty100
9 months agoqtygbapjpesdayazko
8 months, 1 week agoqwerty100
9 months agoinsaniunt
9 months, 1 week agoxbsumz
9 months, 2 weeks ago