29 de mai. de 2023

CEH: Gathering Network And Host Information, Types Of Scan


In Hacking the main focus is over gathering the information about victim or victim's machine. Which will help to find out which type of exploit will works according to the given circumstances. Gathering the network and host information means to find out by which network, the which victim's machine is connected and communicating over the network. Moreover, scanning is also performed for gathering information about open and closed ports. After that they'll able to find the vulnerabilities in the target system and try to get access to the system.

Types Of Scan

As a CEH you should know the scan types and uses:

SYN

SYN scan doesn't complete the TCP three way handshake that is why it is known as a half-open scan. An attacker send a SYN packet to the victim machine if SYN/ACK packet is received back to attacker, then it clarify that the port is listening due to the acknowledgment by the victim that it has completed the connection. While if the attacker is received the RST/ACK packet then it assumed that the port is closed or open.


XMAS

XMAS scan works only on target system that has the RFC 793 development of TCP/IP and it doesn't works against any version of windows.
XMAS scan send a packet with by setting up the FIN, URG and PSH flags of the TCP header. The function of this scan is if the port is active there will be no response but if the port is closed the target responds with a RST/ACK packet.


FIN

A FIN scan send a packet by setting up only the FIN flag of the TCP. This scan is similar to XMAS scan. FIN scan receives no response if the port is active while if the port is closed it receives the RST/ACK packet.


NULL 

NULL scan is also similar to the XMAS scan. But the only difference is that it sends a packet without setting up the any flag of TCP header. NULL scan receives no response if the port is open but if the port is closed it receives the RST/ACK packet.


IDLE

It is just like spoofing an IP address by sending a SYN packet to the victim's machine to find out which services are available over the system. This scan is completed with the help of another system called as "Zombie" (that is not receiving or transmitting any information).


Continue reading


  1. Hack Website Online Tool
  2. Android Hack Tools Github
  3. Underground Hacker Sites
  4. Hacker
  5. Pentest Tools Tcp Port Scanner
  6. Hack Apps
  7. Hacking Tools And Software
  8. Hak5 Tools
  9. Hacking Apps
  10. Hacking Tools For Windows Free Download
  11. Hacking Tools Free Download
  12. Free Pentest Tools For Windows
  13. Hacker Tools Github
  14. Hacker Tool Kit
  15. Hacker Tools
  16. Hack Tools Download
  17. Hack Apps
  18. New Hack Tools
  19. Termux Hacking Tools 2019
  20. Pentest Box Tools Download
  21. Hacking Tools Free Download
  22. Pentest Tools Bluekeep
  23. Install Pentest Tools Ubuntu
  24. Hack Tools For Pc
  25. Hacker Search Tools
  26. Hacking Tools Kit
  27. Github Hacking Tools
  28. Hacking Tools For Kali Linux
  29. World No 1 Hacker Software
  30. Hacking Tools
  31. Pentest Tools For Windows
  32. Hacker Tools Online
  33. Hacks And Tools
  34. Hak5 Tools
  35. What Are Hacking Tools
  36. Hacking Tools Free Download
  37. Usb Pentest Tools
  38. Hack Tools Mac
  39. Underground Hacker Sites
  40. Underground Hacker Sites
  41. Wifi Hacker Tools For Windows
  42. Tools For Hacker
  43. Pentest Tools Framework
  44. Hack Tools
  45. Pentest Tools Website
  46. Tools Used For Hacking
  47. Hacker Tools Linux
  48. Hack Tools Github
  49. Pentest Tools Free
  50. Pentest Tools Windows
  51. Pentest Tools Windows
  52. Hack Tools For Windows
  53. Pentest Tools Review
  54. Top Pentest Tools
  55. Hacking Tools For Beginners
  56. Hack Tools Online
  57. Hacking Tools Pc
  58. Tools For Hacker
  59. Hacker Tool Kit
  60. Hacking Tools 2019
  61. How To Hack
  62. Underground Hacker Sites
  63. Pentest Tools Android
  64. Hack Tools Pc
  65. Best Hacking Tools 2020
  66. Ethical Hacker Tools
  67. Hacker Tools
  68. Hack And Tools
  69. Hacker Security Tools
  70. Hack Tools For Pc
  71. Pentest Tools Website Vulnerability
  72. Pentest Tools Apk
  73. Pentest Reporting Tools
  74. Best Hacking Tools 2020
  75. Pentest Tools Apk
  76. Nsa Hack Tools
  77. Hacking Tools For Windows
  78. Pentest Tools Find Subdomains
  79. Hacking Tools Hardware
  80. Hackers Toolbox
  81. Hacking Apps
  82. Top Pentest Tools
  83. Hacker Tools Online
  84. Hacker Tools For Windows
  85. Hacker Techniques Tools And Incident Handling
  86. Pentest Reporting Tools
  87. Hacker Tools
  88. Pentest Tools For Android
  89. Tools Used For Hacking
  90. Hacking Apps
  91. Hack Tools
  92. Hack Tools Mac
  93. Hacking Tools Kit
  94. Hack Tools Online
  95. Best Pentesting Tools 2018
  96. Hacking Tools For Windows Free Download
  97. Hack App
  98. Nsa Hack Tools
  99. Pentest Box Tools Download
  100. Pentest Tools Review
  101. Hack Tools For Windows
  102. Pentest Box Tools Download
  103. Hack Tools
  104. Pentest Tools Github
  105. Hacker Tools
  106. Hacking Tools Usb
  107. Hack Tools Download
  108. Hacking Tools For Mac
  109. Game Hacking
  110. What Is Hacking Tools
  111. Pentest Tools Android
  112. Pentest Tools Online
  113. Hacker Tools Windows
  114. Physical Pentest Tools
  115. Hack Tools Pc
  116. How To Install Pentest Tools In Ubuntu
  117. Hacking Tools
  118. Hack Tools Download
  119. Hacker Tools Online
  120. Tools 4 Hack
  121. Hack Tools For Windows
  122. Github Hacking Tools

Nenhum comentário: