What does the response code anti-reconnaissance option do in the advanced features?
Some of the best hacker reconnaissance tools rely on odd HTTP error and status condition responses that they have discovered in extensive penetration testing, and ServerMask is designed to thwart their efforts. While we do not want to share a complete list of the types of subtle message and format changes that we employ in ServerMask (as we do not want to make recon easier for the hackers), the tool does modify some 200, 400, 403, 404, 405 and 501 server responses that are used to identify IIS at the HTTP header level. This will not break your pages, but it will overpower some of the most robust hacker scanners available today. One example: use an HTTP analysis tool and make a customized request with HTTP version 5.6 (this specification does not exist yet), and see how ServerMask responds…