There are plenty of ways to accomplish the task of identifying live systems. Some common ways to perform this task is by using the following:
Each of these techniques, offers something that the others does not, or at least not in the same way. When looking at these methods, keep in mind that you should be paying attention to the areas in which each is strong and those areas in which they are weak. Deploying the wrong one could easily waste time as well as alert the system owner to your presence, thus giving them time to react to your attack.
- Wardialing
- Wardriving
- Pinging
- Port Scanning
Each of these techniques, offers something that the others does not, or at least not in the same way. When looking at these methods, keep in mind that you should be paying attention to the areas in which each is strong and those areas in which they are weak. Deploying the wrong one could easily waste time as well as alert the system owner to your presence, thus giving them time to react to your attack.