dimanche 21 janvier 2024

CEH: Gathering Network And Host Information, Types Of Scan


In Hacking the main focus is over gathering the information about victim or victim's machine. Which will help to find out which type of exploit will works according to the given circumstances. Gathering the network and host information means to find out by which network, the which victim's machine is connected and communicating over the network. Moreover, scanning is also performed for gathering information about open and closed ports. After that they'll able to find the vulnerabilities in the target system and try to get access to the system.

Types Of Scan

As a CEH you should know the scan types and uses:

SYN

SYN scan doesn't complete the TCP three way handshake that is why it is known as a half-open scan. An attacker send a SYN packet to the victim machine if SYN/ACK packet is received back to attacker, then it clarify that the port is listening due to the acknowledgment by the victim that it has completed the connection. While if the attacker is received the RST/ACK packet then it assumed that the port is closed or open.


XMAS

XMAS scan works only on target system that has the RFC 793 development of TCP/IP and it doesn't works against any version of windows.
XMAS scan send a packet with by setting up the FIN, URG and PSH flags of the TCP header. The function of this scan is if the port is active there will be no response but if the port is closed the target responds with a RST/ACK packet.


FIN

A FIN scan send a packet by setting up only the FIN flag of the TCP. This scan is similar to XMAS scan. FIN scan receives no response if the port is active while if the port is closed it receives the RST/ACK packet.


NULL 

NULL scan is also similar to the XMAS scan. But the only difference is that it sends a packet without setting up the any flag of TCP header. NULL scan receives no response if the port is open but if the port is closed it receives the RST/ACK packet.


IDLE

It is just like spoofing an IP address by sending a SYN packet to the victim's machine to find out which services are available over the system. This scan is completed with the help of another system called as "Zombie" (that is not receiving or transmitting any information).


Read more


  1. Pentest Tools Github
  2. Android Hack Tools Github
  3. What Are Hacking Tools
  4. Pentest Tools Online
  5. Hacking Tools For Windows
  6. What Are Hacking Tools
  7. Hacker Security Tools
  8. Pentest Tools Framework
  9. Hacker Hardware Tools
  10. Hacking Tools For Windows Free Download
  11. Hackrf Tools
  12. Install Pentest Tools Ubuntu
  13. Hacker Tools Free
  14. Hacking Tools And Software
  15. Hacking Tools For Mac
  16. Hacking Tools For Windows
  17. Hacker Tools For Pc
  18. Hacking Tools Windows
  19. What Is Hacking Tools
  20. Hacker Tools
  21. New Hacker Tools
  22. Hacker Tools 2020
  23. Hack Tools Online
  24. Hacking Tools Windows
  25. Hacking Tools For Beginners
  26. Hack Rom Tools
  27. Pentest Tools Open Source
  28. Pentest Tools Download
  29. Hacking Tools 2020
  30. Pentest Tools Bluekeep
  31. Pentest Tools Linux
  32. Hackrf Tools
  33. How To Make Hacking Tools
  34. Best Hacking Tools 2020
  35. Hack Tools For Pc
  36. Bluetooth Hacking Tools Kali
  37. Hacking Tools For Games
  38. Bluetooth Hacking Tools Kali
  39. Hacks And Tools
  40. Ethical Hacker Tools
  41. Ethical Hacker Tools
  42. Hacker Hardware Tools
  43. What Are Hacking Tools
  44. Hak5 Tools
  45. Hack Tools For Ubuntu
  46. Pentest Tools Free
  47. Pentest Tools Free
  48. Best Pentesting Tools 2018
  49. Pentest Tools Url Fuzzer
  50. Hacking Tools Pc
  51. Hack Tools For Mac
  52. Growth Hacker Tools
  53. Hacking Tools Hardware
  54. Pentest Tools Open Source
  55. Hacking Tools For Beginners
  56. Hacking Tools Kit
  57. Github Hacking Tools
  58. Hacking Tools For Kali Linux
  59. Pentest Tools Linux
  60. Pentest Tools Review
  61. Hack Apps
  62. Hacking Tools Kit
  63. Hacker Tools Apk Download
  64. Hacker Tools Apk Download
  65. Bluetooth Hacking Tools Kali
  66. Nsa Hack Tools Download
  67. Termux Hacking Tools 2019
  68. Hack Rom Tools
  69. Hack Tools 2019
  70. New Hack Tools
  71. Hacker Techniques Tools And Incident Handling
  72. Pentest Tools Windows
  73. Hacking App
  74. Hack Tool Apk No Root
  75. Hacking Tools Windows
  76. Hacking Tools Download
  77. Hacker Tools Free
  78. Hacker Tools Windows
  79. How To Hack
  80. Hacking Tools Windows 10
  81. Hack Tools
  82. Pentest Tools Website
  83. Underground Hacker Sites
  84. Pentest Tools Download
  85. Hacker Tools Free
  86. Pentest Recon Tools
  87. What Is Hacking Tools
  88. Pentest Tools Website Vulnerability
  89. Pentest Reporting Tools
  90. Top Pentest Tools
  91. Hacking Tools Software
  92. Hackers Toolbox
  93. Pentest Tools Url Fuzzer
  94. Pentest Tools
  95. Pentest Tools
  96. Hack And Tools
  97. Nsa Hack Tools
  98. Nsa Hacker Tools
  99. Pentest Reporting Tools
  100. Pentest Tools Nmap
  101. Pentest Tools Subdomain
  102. Hacker Tools Online
  103. Hacking Tools Windows
  104. Pentest Tools For Ubuntu
  105. Hack Tools
  106. Pentest Tools Free
  107. Hack Tools For Mac
  108. Hack Tools
  109. Hacker Tools Free Download
  110. Hacker Search Tools
  111. Pentest Tools Free
  112. Hacking Tools Pc
  113. Pentest Tools Free
  114. Install Pentest Tools Ubuntu
  115. Hacking Tools For Pc
  116. Hacking Tools 2019
  117. Hack App
  118. Hacking Tools For Kali Linux
  119. Pentest Tools Alternative
  120. Tools For Hacker
  121. Best Pentesting Tools 2018
  122. Hacker Tools Free
  123. Ethical Hacker Tools
  124. Hacker Search Tools
  125. Hack Tools 2019
  126. How To Hack
  127. Hacking Tools Windows 10
  128. Hacking Tools Windows
  129. Android Hack Tools Github
  130. Hacking Tools Name
  131. How To Install Pentest Tools In Ubuntu

Aucun commentaire:

Enregistrer un commentaire