Thursday, August 20, 2020

CEH: Gathering Network And Host Information, Types Of Scan


In Hacking the main focus is over gathering the information about victim or victim's machine. Which will help to find out which type of exploit will works according to the given circumstances. Gathering the network and host information means to find out by which network, the which victim's machine is connected and communicating over the network. Moreover, scanning is also performed for gathering information about open and closed ports. After that they'll able to find the vulnerabilities in the target system and try to get access to the system.

Types Of Scan

As a CEH you should know the scan types and uses:

SYN

SYN scan doesn't complete the TCP three way handshake that is why it is known as a half-open scan. An attacker send a SYN packet to the victim machine if SYN/ACK packet is received back to attacker, then it clarify that the port is listening due to the acknowledgment by the victim that it has completed the connection. While if the attacker is received the RST/ACK packet then it assumed that the port is closed or open.


XMAS

XMAS scan works only on target system that has the RFC 793 development of TCP/IP and it doesn't works against any version of windows.
XMAS scan send a packet with by setting up the FIN, URG and PSH flags of the TCP header. The function of this scan is if the port is active there will be no response but if the port is closed the target responds with a RST/ACK packet.


FIN

A FIN scan send a packet by setting up only the FIN flag of the TCP. This scan is similar to XMAS scan. FIN scan receives no response if the port is active while if the port is closed it receives the RST/ACK packet.


NULL 

NULL scan is also similar to the XMAS scan. But the only difference is that it sends a packet without setting up the any flag of TCP header. NULL scan receives no response if the port is open but if the port is closed it receives the RST/ACK packet.


IDLE

It is just like spoofing an IP address by sending a SYN packet to the victim's machine to find out which services are available over the system. This scan is completed with the help of another system called as "Zombie" (that is not receiving or transmitting any information).


Related news


  1. Hacker Tools Free
  2. Hacking Tools For Games
  3. Hacker Tools Online
  4. Pentest Recon Tools
  5. Hacker Techniques Tools And Incident Handling
  6. Hack Tools For Mac
  7. Hacking Tools Pc
  8. Hack Tool Apk
  9. Hacking Tools 2020
  10. Pentest Tools For Mac
  11. Hacking Tools Github
  12. How To Make Hacking Tools
  13. Hack Tools For Games
  14. Tools 4 Hack
  15. Best Pentesting Tools 2018
  16. Hack Tools 2019
  17. Top Pentest Tools
  18. Hacking Tools Pc
  19. Hack Tools For Mac
  20. Hacking Tools Windows
  21. Usb Pentest Tools
  22. Hacker Tools Hardware
  23. Pentest Tools Free
  24. Hacker Tools Windows
  25. Hacker Tools Apk Download
  26. Pentest Tools Kali Linux
  27. Hacking Tools 2019
  28. Pentest Tools For Android
  29. Pentest Tools Url Fuzzer
  30. Hacker Tools
  31. Hacking Tools Windows
  32. Bluetooth Hacking Tools Kali
  33. Pentest Tools Find Subdomains
  34. Hack Tools For Games
  35. Pentest Tools List
  36. Growth Hacker Tools
  37. Pentest Tools Subdomain
  38. Hacker Tools Windows
  39. Nsa Hack Tools Download
  40. Hacker Tools List
  41. Hacking Tools
  42. Hacking Tools Usb
  43. Hacker Techniques Tools And Incident Handling
  44. Pentest Tools Review
  45. Pentest Tools Free
  46. Hacking Tools Software
  47. Hacker Tools Apk Download
  48. Pentest Tools Review
  49. Nsa Hacker Tools
  50. World No 1 Hacker Software
  51. Hack Tools Mac
  52. Pentest Tools Online
  53. Hacking Tools For Windows 7
  54. Best Hacking Tools 2019
  55. Kik Hack Tools
  56. Hacking Tools Windows 10
  57. Hack Tools 2019
  58. Best Pentesting Tools 2018
  59. Hacking Tools Download
  60. Best Pentesting Tools 2018
  61. Pentest Tools Free
  62. Hacker Tools Online
  63. Pentest Tools Url Fuzzer
  64. Game Hacking
  65. Hacks And Tools
  66. Hacker
  67. Hacking Tools For Mac
  68. Hak5 Tools
  69. Github Hacking Tools
  70. New Hack Tools
  71. Physical Pentest Tools
  72. Hack Tools Mac
  73. Hack Tools Download
  74. Hacker Tools Software
  75. Hacker Tools For Mac
  76. Physical Pentest Tools
  77. Hacker Tools
  78. Tools 4 Hack
  79. Hacking Tools For Windows Free Download
  80. Hacking Tools For Pc
  81. Hack Tools
  82. Hacking Tools 2020
  83. Hack Tools 2019
  84. Hacker Tools Linux
  85. Pentest Tools Online
  86. Hacker Tools Mac
  87. Pentest Tools Online
  88. Pentest Tools Github
  89. Best Pentesting Tools 2018
  90. Hacker Tools For Mac
  91. Hacker Tools Free
  92. Hack Tools Mac
  93. Top Pentest Tools
  94. Termux Hacking Tools 2019
  95. Pentest Tools Apk
  96. Hacker Tools Windows
  97. Computer Hacker
  98. How To Install Pentest Tools In Ubuntu
  99. Tools 4 Hack
  100. Hack Tools For Mac
  101. Ethical Hacker Tools
  102. Hack Tool Apk No Root
  103. Hacker
  104. Hacker Tools Apk Download
  105. Hacker Tools Free Download
  106. Pentest Tools Bluekeep
  107. Usb Pentest Tools
  108. Best Hacking Tools 2019
  109. Pentest Tools
  110. Hacking App
  111. Hacking Tools Usb
  112. Hack Tools Pc
  113. Hacking Tools Mac
  114. Hack Tools For Pc
  115. Pentest Reporting Tools
  116. Github Hacking Tools
  117. Nsa Hack Tools Download
  118. Ethical Hacker Tools
  119. What Are Hacking Tools
  120. Hacking Tools 2019
  121. Pentest Box Tools Download
  122. Beginner Hacker Tools
  123. Github Hacking Tools
  124. Hacker Tools 2020
  125. Easy Hack Tools
  126. Pentest Tools Download
  127. Hacking Tools For Windows 7
  128. Hacking Tools For Kali Linux
  129. Wifi Hacker Tools For Windows
  130. Pentest Tools
  131. Hack Tools Online
  132. Hacker Tools 2019
  133. Hacking Tools For Games
  134. Hacker Search Tools
  135. How To Make Hacking Tools
  136. Hacking Tools Hardware
  137. New Hacker Tools
  138. Hacker Tools Free Download
  139. Tools Used For Hacking
  140. Hack Tools Github
  141. How To Install Pentest Tools In Ubuntu
  142. Game Hacking
  143. Pentest Tools Windows
  144. Pentest Tools For Mac
  145. Hacking Tools Free Download
  146. Pentest Tools Port Scanner
  147. Top Pentest Tools
  148. Hacker Tools Apk Download
  149. Hacker Tools List
  150. Hacker
  151. Hacking Tools Name
  152. Tools Used For Hacking
  153. Install Pentest Tools Ubuntu
  154. Hacking Tools For Beginners
  155. Hack Tools
  156. Pentest Tools Website
  157. Hackrf Tools

No comments:

Post a Comment