Monday, January 22, 2024

CEH: Gathering Network And Host Information, Types Of Scan


In Hacking the main focus is over gathering the information about victim or victim's machine. Which will help to find out which type of exploit will works according to the given circumstances. Gathering the network and host information means to find out by which network, the which victim's machine is connected and communicating over the network. Moreover, scanning is also performed for gathering information about open and closed ports. After that they'll able to find the vulnerabilities in the target system and try to get access to the system.

Types Of Scan

As a CEH you should know the scan types and uses:

SYN

SYN scan doesn't complete the TCP three way handshake that is why it is known as a half-open scan. An attacker send a SYN packet to the victim machine if SYN/ACK packet is received back to attacker, then it clarify that the port is listening due to the acknowledgment by the victim that it has completed the connection. While if the attacker is received the RST/ACK packet then it assumed that the port is closed or open.


XMAS

XMAS scan works only on target system that has the RFC 793 development of TCP/IP and it doesn't works against any version of windows.
XMAS scan send a packet with by setting up the FIN, URG and PSH flags of the TCP header. The function of this scan is if the port is active there will be no response but if the port is closed the target responds with a RST/ACK packet.


FIN

A FIN scan send a packet by setting up only the FIN flag of the TCP. This scan is similar to XMAS scan. FIN scan receives no response if the port is active while if the port is closed it receives the RST/ACK packet.


NULL 

NULL scan is also similar to the XMAS scan. But the only difference is that it sends a packet without setting up the any flag of TCP header. NULL scan receives no response if the port is open but if the port is closed it receives the RST/ACK packet.


IDLE

It is just like spoofing an IP address by sending a SYN packet to the victim's machine to find out which services are available over the system. This scan is completed with the help of another system called as "Zombie" (that is not receiving or transmitting any information).


More info

  1. Game Hacking
  2. Physical Pentest Tools
  3. Hacker Tools For Windows
  4. Pentest Reporting Tools
  5. Hack Tools For Windows
  6. Hacking Tools Kit
  7. Hacking Tools Kit
  8. Hacking Tools And Software
  9. Hacker Security Tools
  10. Hacker Tools Apk Download
  11. Hak5 Tools
  12. Pentest Tools Website Vulnerability
  13. Hack Tools For Games
  14. Hacker Tools Free Download
  15. Pentest Tools
  16. Hack Tools
  17. Kik Hack Tools
  18. Hacking Tools Free Download
  19. Pentest Tools Download
  20. Hacking Tools Pc
  21. Pentest Reporting Tools
  22. Nsa Hacker Tools
  23. Hacking Tools For Beginners
  24. Hacking Tools For Mac
  25. Hacking Tools 2019
  26. New Hacker Tools
  27. Hacker Search Tools
  28. Hack Tools For Ubuntu
  29. Blackhat Hacker Tools
  30. Hacking Tools For Windows 7
  31. Hacker Tools Linux
  32. Blackhat Hacker Tools
  33. What Is Hacking Tools
  34. Pentest Tools Android
  35. Tools Used For Hacking
  36. Hacker Tools Apk Download
  37. Pentest Tools For Android
  38. Pentest Tools List
  39. Hacker Search Tools
  40. Hacking Tools For Games
  41. Hacking Tools For Beginners
  42. Pentest Tools Find Subdomains
  43. Github Hacking Tools
  44. Game Hacking
  45. Nsa Hack Tools
  46. Computer Hacker
  47. Termux Hacking Tools 2019
  48. Nsa Hack Tools Download
  49. Hackers Toolbox
  50. How To Install Pentest Tools In Ubuntu
  51. Hack Tools For Pc
  52. Wifi Hacker Tools For Windows
  53. Pentest Tools Website Vulnerability
  54. Hacking Tools Kit
  55. Pentest Tools Nmap
  56. Hacking Tools Download
  57. Hacker Tools Free Download
  58. Hack Tools For Pc
  59. Black Hat Hacker Tools
  60. Pentest Tools Linux
  61. Growth Hacker Tools
  62. Pentest Tools Android
  63. Hacker Tool Kit
  64. Hacking Tools
  65. Nsa Hacker Tools
  66. Github Hacking Tools
  67. Hacker Tools For Ios
  68. Termux Hacking Tools 2019
  69. Hack Apps
  70. Hacker Tools For Windows
  71. Hack And Tools
  72. Hacking Tools Mac
  73. Pentest Tools Online
  74. Hacking Tools Online
  75. Hacking Tools For Beginners
  76. Usb Pentest Tools
  77. Hak5 Tools
  78. Hacking Tools Windows
  79. Tools 4 Hack
  80. Pentest Tools Online
  81. Hack Tool Apk
  82. Hack Tools For Mac
  83. Pentest Tools List
  84. Hacking Tools For Windows
  85. Hacking Tools Kit
  86. Wifi Hacker Tools For Windows
  87. Hacking Tools Kit
  88. Tools 4 Hack
  89. Nsa Hack Tools Download
  90. Android Hack Tools Github
  91. Pentest Tools Apk
  92. Game Hacking
  93. Bluetooth Hacking Tools Kali
  94. How To Install Pentest Tools In Ubuntu
  95. Tools Used For Hacking
  96. Tools 4 Hack
  97. Hacker Tools Free Download
  98. Pentest Tools Tcp Port Scanner
  99. Hacking Tools For Mac
  100. Pentest Tools Github
  101. Usb Pentest Tools
  102. Hackers Toolbox
  103. Blackhat Hacker Tools
  104. Pentest Tools Website
  105. Pentest Tools Port Scanner
  106. Beginner Hacker Tools
  107. Hacking Tools And Software
  108. Hacker Tools
  109. Hacker Tools For Ios
  110. Hacking Tools For Windows
  111. Hack Tools For Windows
  112. Pentest Tools Online
  113. Hack Tool Apk No Root
  114. Tools For Hacker
  115. Hack Tools Download
  116. Pentest Tools For Windows
  117. Hacking Tools Usb
  118. Hack Tools For Pc
  119. Pentest Tools Port Scanner
  120. Termux Hacking Tools 2019
  121. Hacker Security Tools
  122. Hack Rom Tools
  123. Beginner Hacker Tools
  124. New Hacker Tools
  125. Hacker Tools Online
  126. Pentest Tools
  127. Pentest Recon Tools
  128. New Hack Tools
  129. Hacker Tools For Mac
  130. Hacker Techniques Tools And Incident Handling
  131. Hacking Tools Free Download
  132. Hacking Tools For Pc
  133. Hack Tools Download
  134. Pentest Tools For Mac
  135. Hack Tools Online
  136. Hacker Tools Apk
  137. Tools For Hacker
  138. Pentest Tools Android
  139. Hacker Tools Apk Download
  140. Hacker Tools For Pc
  141. Top Pentest Tools
  142. Pentest Reporting Tools
  143. Pentest Tools Review
  144. Hack Apps
  145. Hacking Tools Usb
  146. Pentest Tools List
  147. Pentest Automation Tools
  148. Pentest Tools Find Subdomains
  149. Pentest Reporting Tools

No comments:

Post a Comment