Answer:
Once the network is known, the second step is to spy the active IP addresses on the network. For identifying active IP addresses (ICMP) Internet Control Message Protocol is an active IP addresses.
Previous Question | Next Question |
What are the common tools which are used by Ethical hackers? | Define Open Source Footprinting? |