Monday, 22 January 2024

CEH: Gathering Network And Host Information, Types Of Scan


In Hacking the main focus is over gathering the information about victim or victim's machine. Which will help to find out which type of exploit will works according to the given circumstances. Gathering the network and host information means to find out by which network, the which victim's machine is connected and communicating over the network. Moreover, scanning is also performed for gathering information about open and closed ports. After that they'll able to find the vulnerabilities in the target system and try to get access to the system.

Types Of Scan

As a CEH you should know the scan types and uses:

SYN

SYN scan doesn't complete the TCP three way handshake that is why it is known as a half-open scan. An attacker send a SYN packet to the victim machine if SYN/ACK packet is received back to attacker, then it clarify that the port is listening due to the acknowledgment by the victim that it has completed the connection. While if the attacker is received the RST/ACK packet then it assumed that the port is closed or open.


XMAS

XMAS scan works only on target system that has the RFC 793 development of TCP/IP and it doesn't works against any version of windows.
XMAS scan send a packet with by setting up the FIN, URG and PSH flags of the TCP header. The function of this scan is if the port is active there will be no response but if the port is closed the target responds with a RST/ACK packet.


FIN

A FIN scan send a packet by setting up only the FIN flag of the TCP. This scan is similar to XMAS scan. FIN scan receives no response if the port is active while if the port is closed it receives the RST/ACK packet.


NULL 

NULL scan is also similar to the XMAS scan. But the only difference is that it sends a packet without setting up the any flag of TCP header. NULL scan receives no response if the port is open but if the port is closed it receives the RST/ACK packet.


IDLE

It is just like spoofing an IP address by sending a SYN packet to the victim's machine to find out which services are available over the system. This scan is completed with the help of another system called as "Zombie" (that is not receiving or transmitting any information).


Read more
  1. Hacking Tools Windows
  2. Pentest Tools Find Subdomains
  3. Tools For Hacker
  4. Usb Pentest Tools
  5. Github Hacking Tools
  6. Nsa Hack Tools
  7. Hack Tools 2019
  8. Pentest Tools Online
  9. Hacking Tools Github
  10. Hacker Tools Free
  11. Pentest Tools For Windows
  12. Pentest Tools Website Vulnerability
  13. Hack Tools For Games
  14. Hack Tools Mac
  15. Hacking Tools Hardware
  16. Hack Tools For Ubuntu
  17. Pentest Tools Kali Linux
  18. Hacker Tools 2020
  19. Hak5 Tools
  20. Pentest Tools Apk
  21. Pentest Recon Tools
  22. Install Pentest Tools Ubuntu
  23. Pentest Box Tools Download
  24. Best Hacking Tools 2020
  25. Beginner Hacker Tools
  26. Kik Hack Tools
  27. Pentest Tools Url Fuzzer
  28. Pentest Tools Github
  29. How To Make Hacking Tools
  30. World No 1 Hacker Software
  31. Pentest Tools List
  32. Hack And Tools
  33. Pentest Tools
  34. Pentest Reporting Tools
  35. Pentest Tools
  36. Hacking Tools 2020
  37. Nsa Hack Tools Download
  38. Bluetooth Hacking Tools Kali
  39. Pentest Recon Tools
  40. Hacking Tools For Games
  41. Top Pentest Tools
  42. Hacker Tools Mac
  43. Hacker Tools Software
  44. Hacker Tools Linux
  45. Hacker Security Tools
  46. Hacking Tools Pc
  47. Pentest Tools Apk
  48. Hacking Tools 2020
  49. Pentest Automation Tools
  50. World No 1 Hacker Software
  51. Growth Hacker Tools
  52. Hacking Tools Download
  53. Hacker Tools For Windows
  54. Hackrf Tools
  55. Hackrf Tools
  56. Tools Used For Hacking
  57. Hacker Tools 2019
  58. Hacker Hardware Tools
  59. Pentest Tools Tcp Port Scanner
  60. Hacker Tools Free Download
  61. How To Hack
  62. Pentest Tools Free
  63. Hacker Tools Free Download
  64. Wifi Hacker Tools For Windows
  65. Hacking Tools Mac
  66. Hacking Tools For Windows Free Download
  67. Hacking Tools Pc
  68. Hack Tools 2019
  69. Hacker Tools For Ios
  70. Pentest Tools For Windows
  71. Pentest Tools Download
  72. Kik Hack Tools
  73. Hacker Techniques Tools And Incident Handling
  74. Ethical Hacker Tools
  75. Pentest Tools Website
  76. Blackhat Hacker Tools
  77. Underground Hacker Sites
  78. Pentest Tools Framework
  79. Pentest Tools For Ubuntu
  80. Hack Rom Tools
  81. Hacker Tools Software
  82. Hacking Tools 2020
  83. Hack Tool Apk
  84. Hacks And Tools
  85. Pentest Tools For Windows
  86. Hacker Tools For Windows
  87. Pentest Tools Nmap
  88. Nsa Hack Tools Download
  89. Black Hat Hacker Tools
  90. Pentest Tools For Ubuntu
  91. Hacking Tools For Games
  92. What Is Hacking Tools
  93. Hack Tools For Ubuntu
  94. Hack Tools Pc
  95. Hacker Tools For Windows
  96. Hack Tools
  97. Hacking Tools For Windows Free Download
  98. Hack Tools
  99. Usb Pentest Tools
  100. Growth Hacker Tools
  101. Pentest Tools For Android
  102. Hacking Tools For Windows 7
  103. Hacker Tools For Ios
  104. Pentest Tools Alternative
  105. Pentest Tools Port Scanner
  106. Hacking Tools Online
  107. Pentest Tools List
  108. New Hacker Tools
  109. Pentest Tools For Mac
  110. Hack And Tools
  111. Hacker Techniques Tools And Incident Handling
  112. Hacker Tools Linux
  113. Pentest Tools Nmap
  114. Hack Tools For Pc
  115. Computer Hacker
  116. Hacker Tools For Ios
  117. Hacking Tools Hardware
  118. Hack Tools Pc
  119. Tools For Hacker
  120. Hacking Tools Free Download
  121. Pentest Tools Apk
  122. Physical Pentest Tools
  123. Hacking Tools And Software
  124. Hacking Tools For Mac
  125. Pentest Recon Tools
  126. Pentest Tools List
  127. Pentest Tools For Android
  128. Black Hat Hacker Tools
  129. Pentest Tools Kali Linux
  130. Beginner Hacker Tools
  131. Hack Tools Mac
  132. Hack Tools
  133. Hack Tools For Games
  134. Physical Pentest Tools
  135. Hack Tools For Pc

No comments:

Post a Comment