An ethical hacker is performing a network scan to evaluate the security of a company's IT infrastructure. During the scan, he discovers an active host with multiple open ports running various services. The hacker uses TCP communication flags to establish a connection with the host and starts communicating with it. He sends a SYN packet to a port on the host and receives a SYN/ACK packet back. He then sends an ACK packet for the received SYN/ACK packet, which triggers an open connection. Which of the following actions should the ethical hacker perform next?
e020fdc
2 months, 4 weeks agoagelbahri
5 months, 1 week agoKalingaDev
8 months agoblehbleh
8 months, 3 weeks agoazdan
11 months, 2 weeks agokevin403
1 year agoGK2205
1 year agoTruth_Seeker
1 year, 1 month agoMustafaDDD
1 year, 5 months agoqwerty100
1 year, 5 months agoqtygbapjpesdayazko
1 year, 5 months agoqwerty100
1 year, 5 months agoinsaniunt
1 year, 6 months agoxbsumz
1 year, 6 months ago