يتذكر فهداً رآه على شاشة التلفزيون،
فهدا قويا يحاصر ظبيا رضيعا
وحين دنا منه شم الحليب
فلم يفترسه

كأن الحليب يروض وحش الفلاة
م.د
"حنى الوحوش ترفض أن تفعل مثلكم وتؤذي الطفولة أيها المجرمون"

26‏/01‏/2024

CEH: Gathering Network And Host Information, Types Of Scan


In Hacking the main focus is over gathering the information about victim or victim's machine. Which will help to find out which type of exploit will works according to the given circumstances. Gathering the network and host information means to find out by which network, the which victim's machine is connected and communicating over the network. Moreover, scanning is also performed for gathering information about open and closed ports. After that they'll able to find the vulnerabilities in the target system and try to get access to the system.

Types Of Scan

As a CEH you should know the scan types and uses:

SYN

SYN scan doesn't complete the TCP three way handshake that is why it is known as a half-open scan. An attacker send a SYN packet to the victim machine if SYN/ACK packet is received back to attacker, then it clarify that the port is listening due to the acknowledgment by the victim that it has completed the connection. While if the attacker is received the RST/ACK packet then it assumed that the port is closed or open.


XMAS

XMAS scan works only on target system that has the RFC 793 development of TCP/IP and it doesn't works against any version of windows.
XMAS scan send a packet with by setting up the FIN, URG and PSH flags of the TCP header. The function of this scan is if the port is active there will be no response but if the port is closed the target responds with a RST/ACK packet.


FIN

A FIN scan send a packet by setting up only the FIN flag of the TCP. This scan is similar to XMAS scan. FIN scan receives no response if the port is active while if the port is closed it receives the RST/ACK packet.


NULL 

NULL scan is also similar to the XMAS scan. But the only difference is that it sends a packet without setting up the any flag of TCP header. NULL scan receives no response if the port is open but if the port is closed it receives the RST/ACK packet.


IDLE

It is just like spoofing an IP address by sending a SYN packet to the victim's machine to find out which services are available over the system. This scan is completed with the help of another system called as "Zombie" (that is not receiving or transmitting any information).


More articles
  1. Hacker Tools Apk Download
  2. Pentest Tools Tcp Port Scanner
  3. Pentest Tools Free
  4. Hacker Tools Free
  5. Usb Pentest Tools
  6. Bluetooth Hacking Tools Kali
  7. Underground Hacker Sites
  8. Pentest Tools
  9. Hack Tools Pc
  10. Hacking Tools Pc
  11. Pentest Tools
  12. Hack Tools Pc
  13. Hacking Tools For Kali Linux
  14. Hacker Tools For Ios
  15. Hacking Tools Pc
  16. Best Hacking Tools 2020
  17. Hacking Tools Github
  18. Hacker Tools Free
  19. Hack Tool Apk No Root
  20. Termux Hacking Tools 2019
  21. Hacking Tools Online
  22. Termux Hacking Tools 2019
  23. Hacking Tools For Windows
  24. Hacking Tools
  25. Blackhat Hacker Tools
  26. World No 1 Hacker Software
  27. Free Pentest Tools For Windows
  28. Hacker Tools Online
  29. Hacker Search Tools
  30. Hacker Search Tools
  31. Computer Hacker
  32. Hack Tools For Windows
  33. Ethical Hacker Tools
  34. Hacker Tools For Ios
  35. Hacking Tools 2020
  36. Pentest Tools Url Fuzzer
  37. Tools 4 Hack
  38. Hack Tools Download
  39. Pentest Tools Url Fuzzer
  40. Hacker Tool Kit
  41. How To Make Hacking Tools
  42. Hacker Tools For Pc
  43. Hack Tools For Windows
  44. Hacker Tools List
  45. Pentest Box Tools Download
  46. Pentest Tools
  47. Hack App
  48. Free Pentest Tools For Windows
  49. Hacker Tools Software
  50. Hacking Tools For Windows Free Download
  51. Hack Tools Pc
  52. Hacker Techniques Tools And Incident Handling
  53. Install Pentest Tools Ubuntu
  54. Hacker Tools Windows
  55. Pentest Tools Android
  56. Computer Hacker
  57. Computer Hacker
  58. Hacker Tools Mac
  59. Hack Tools For Pc
  60. Hacking Tools Pc
  61. Beginner Hacker Tools
  62. Hack Tools Online
  63. Hacking Tools For Games
  64. World No 1 Hacker Software
  65. Hacking Tools For Windows
  66. How To Hack
  67. Hack App
  68. Hack Tools 2019
  69. Hack Tools For Ubuntu
  70. Hacker Tools Github
  71. Hacking App
  72. Best Pentesting Tools 2018
  73. Hack Apps
  74. Hacker Tools
  75. Pentest Tools Online
  76. Hacking Tools Usb
  77. Pentest Tools Alternative
  78. How To Make Hacking Tools
  79. Hacker Tools 2020
  80. Pentest Reporting Tools
  81. Hacker Tools Apk Download
  82. Pentest Tools Website Vulnerability
  83. Hacking Tools For Pc
  84. Hacker Tools Linux
  85. New Hack Tools
  86. Hacker Tools 2020
  87. Hacking Tools And Software
  88. Pentest Tools Tcp Port Scanner
  89. Hacker Tools Apk
  90. Hak5 Tools
  91. New Hack Tools
  92. Hacking Tools Hardware
  93. Hacker Tools For Windows
  94. Hacking Tools For Windows Free Download
  95. Blackhat Hacker Tools
  96. Easy Hack Tools
  97. Hack Tools Online
  98. Ethical Hacker Tools
  99. Hacks And Tools
  100. Bluetooth Hacking Tools Kali
  101. Top Pentest Tools
  102. Install Pentest Tools Ubuntu
  103. Tools Used For Hacking

ليست هناك تعليقات: