Modern reconnaissance tools are “noisy” and use predictable patterns, signatures, or probe types. This can lead to unreliable results due to defensive deception or blocking. These tools also leave a large footprint on the targeted system's logs that can potentially provide leads back to the collection source.
To overcome these limitations, our DCA tool conducts slow scans from a large number of nodes scattered across the Internet, using obfuscation techniques such as proxy reflection and legitimate connection methods to remain “below the radar” of common IDS/IPS. Our DCA tool is flexible, allowing for rapid customization to meet requirements.
- Discreetly collects data without leaving a detectable trail
- Flexible architecture can be customized to specific requirements
Return to previous page