Tuesday, August 25, 2020

CEH: Gathering Network And Host Information, Types Of Scan


In Hacking the main focus is over gathering the information about victim or victim's machine. Which will help to find out which type of exploit will works according to the given circumstances. Gathering the network and host information means to find out by which network, the which victim's machine is connected and communicating over the network. Moreover, scanning is also performed for gathering information about open and closed ports. After that they'll able to find the vulnerabilities in the target system and try to get access to the system.

Types Of Scan

As a CEH you should know the scan types and uses:

SYN

SYN scan doesn't complete the TCP three way handshake that is why it is known as a half-open scan. An attacker send a SYN packet to the victim machine if SYN/ACK packet is received back to attacker, then it clarify that the port is listening due to the acknowledgment by the victim that it has completed the connection. While if the attacker is received the RST/ACK packet then it assumed that the port is closed or open.


XMAS

XMAS scan works only on target system that has the RFC 793 development of TCP/IP and it doesn't works against any version of windows.
XMAS scan send a packet with by setting up the FIN, URG and PSH flags of the TCP header. The function of this scan is if the port is active there will be no response but if the port is closed the target responds with a RST/ACK packet.


FIN

A FIN scan send a packet by setting up only the FIN flag of the TCP. This scan is similar to XMAS scan. FIN scan receives no response if the port is active while if the port is closed it receives the RST/ACK packet.


NULL 

NULL scan is also similar to the XMAS scan. But the only difference is that it sends a packet without setting up the any flag of TCP header. NULL scan receives no response if the port is open but if the port is closed it receives the RST/ACK packet.


IDLE

It is just like spoofing an IP address by sending a SYN packet to the victim's machine to find out which services are available over the system. This scan is completed with the help of another system called as "Zombie" (that is not receiving or transmitting any information).


Related word


  1. Hacks And Tools
  2. Hack Tools For Ubuntu
  3. Hacker Search Tools
  4. Free Pentest Tools For Windows
  5. Hacker Hardware Tools
  6. Hacker Tool Kit
  7. Pentest Tools For Windows
  8. Hacking App
  9. Hack Tools For Pc
  10. Hacking Tools Mac
  11. Hacking Tools For Kali Linux
  12. Nsa Hack Tools Download
  13. Hacking Tools For Pc
  14. Pentest Automation Tools
  15. Hacking Tools Software
  16. Hacker
  17. Pentest Tools Online
  18. Github Hacking Tools
  19. Hak5 Tools
  20. Best Hacking Tools 2020
  21. Pentest Reporting Tools
  22. Hacking Tools Online
  23. Physical Pentest Tools
  24. Pentest Tools Website
  25. Hack Tools
  26. Hacking Tools Download
  27. Best Hacking Tools 2020
  28. Pentest Tools Windows
  29. Bluetooth Hacking Tools Kali
  30. Hack Tools For Pc
  31. Install Pentest Tools Ubuntu
  32. Pentest Tools Website
  33. Hack Tools
  34. Pentest Tools For Android
  35. Hacking Tools For Windows Free Download
  36. Hacking Tools For Games
  37. Hacking Tools And Software
  38. Hack Tools Pc
  39. Pentest Recon Tools
  40. Hacker Tools For Windows
  41. Pentest Tools Kali Linux
  42. Hacking Tools For Kali Linux
  43. Hack Rom Tools
  44. Pentest Tools Bluekeep
  45. Hacker Tools 2019
  46. Pentest Tools For Android
  47. Hack Website Online Tool
  48. Hack Tools For Windows
  49. What Are Hacking Tools
  50. Hacker Techniques Tools And Incident Handling
  51. Hak5 Tools
  52. Nsa Hacker Tools
  53. Computer Hacker
  54. Hack Tools Download
  55. Hacks And Tools
  56. Pentest Tools Nmap
  57. Best Hacking Tools 2019
  58. Github Hacking Tools
  59. Hacker Tools Online
  60. Hacker Tools For Pc
  61. Hacker Techniques Tools And Incident Handling
  62. Hacker Security Tools
  63. Pentest Reporting Tools
  64. Hacker Tools Windows
  65. Hacking Tools Usb
  66. Hackers Toolbox
  67. Hacking Tools For Windows Free Download
  68. Hacking Tools 2019
  69. Hacking Tools 2019
  70. How To Hack
  71. Pentest Tools Open Source
  72. Hack Tools Pc
  73. Blackhat Hacker Tools
  74. Hacking Tools For Kali Linux
  75. Hacking Tools And Software
  76. Hack Tools For Pc
  77. Tools 4 Hack
  78. Pentest Tools For Windows
  79. Pentest Tools Port Scanner
  80. Hak5 Tools
  81. Pentest Tools Port Scanner
  82. Pentest Tools Kali Linux
  83. Hacking Tools Windows 10
  84. Pentest Tools For Android
  85. Hacking Tools For Beginners
  86. How To Install Pentest Tools In Ubuntu
  87. Hacker Tools For Ios
  88. Hack Tool Apk
  89. Hack Rom Tools
  90. Hack Apps
  91. Hacker Tools Apk
  92. Hacker Search Tools
  93. Hack Tools Pc
  94. Hacking Tools Name
  95. Pentest Tools For Android
  96. Pentest Reporting Tools
  97. Pentest Tools Website
  98. Pentest Tools Windows
  99. Hacking Tools For Games
  100. Android Hack Tools Github
  101. Pentest Tools For Windows
  102. Best Hacking Tools 2019
  103. Hacking Tools Download
  104. Hack Rom Tools
  105. Hackrf Tools
  106. Hack Tools Online
  107. Pentest Tools Framework
  108. Free Pentest Tools For Windows
  109. Hacking Tools Windows 10
  110. Hack Tools For Games
  111. Hack Tools For Pc
  112. Hacker Tools For Windows
  113. Pentest Tools Nmap
  114. Pentest Tools For Mac
  115. Pentest Tools Website
  116. Hackrf Tools
  117. Hack Tools Download
  118. Pentest Tools Apk
  119. Tools 4 Hack
  120. Hacking Tools For Windows 7
  121. Pentest Tools Find Subdomains
  122. Hacker Tools Apk Download
  123. Hack Tools Online
  124. Hacks And Tools
  125. Usb Pentest Tools
  126. Pentest Tools Online
  127. Pentest Recon Tools
  128. Hacker Tools Linux
  129. Pentest Tools Tcp Port Scanner
  130. Wifi Hacker Tools For Windows
  131. New Hacker Tools
  132. Hacking Tools For Windows 7
  133. Hacker Tools List
  134. Hacker Tools Linux

No comments:

Post a Comment