Thursday, January 18, 2024

CEH: Gathering Network And Host Information, Types Of Scan


In Hacking the main focus is over gathering the information about victim or victim's machine. Which will help to find out which type of exploit will works according to the given circumstances. Gathering the network and host information means to find out by which network, the which victim's machine is connected and communicating over the network. Moreover, scanning is also performed for gathering information about open and closed ports. After that they'll able to find the vulnerabilities in the target system and try to get access to the system.

Types Of Scan

As a CEH you should know the scan types and uses:

SYN

SYN scan doesn't complete the TCP three way handshake that is why it is known as a half-open scan. An attacker send a SYN packet to the victim machine if SYN/ACK packet is received back to attacker, then it clarify that the port is listening due to the acknowledgment by the victim that it has completed the connection. While if the attacker is received the RST/ACK packet then it assumed that the port is closed or open.


XMAS

XMAS scan works only on target system that has the RFC 793 development of TCP/IP and it doesn't works against any version of windows.
XMAS scan send a packet with by setting up the FIN, URG and PSH flags of the TCP header. The function of this scan is if the port is active there will be no response but if the port is closed the target responds with a RST/ACK packet.


FIN

A FIN scan send a packet by setting up only the FIN flag of the TCP. This scan is similar to XMAS scan. FIN scan receives no response if the port is active while if the port is closed it receives the RST/ACK packet.


NULL 

NULL scan is also similar to the XMAS scan. But the only difference is that it sends a packet without setting up the any flag of TCP header. NULL scan receives no response if the port is open but if the port is closed it receives the RST/ACK packet.


IDLE

It is just like spoofing an IP address by sending a SYN packet to the victim's machine to find out which services are available over the system. This scan is completed with the help of another system called as "Zombie" (that is not receiving or transmitting any information).


More info
  1. Pentest Tools Linux
  2. Hacking Tools Usb
  3. Beginner Hacker Tools
  4. Pentest Reporting Tools
  5. Tools Used For Hacking
  6. Hacking Tools Pc
  7. What Is Hacking Tools
  8. Pentest Tools Url Fuzzer
  9. Hacking Tools Windows
  10. Hacker Security Tools
  11. Hacking Tools For Beginners
  12. Hacking Tools 2019
  13. Best Hacking Tools 2020
  14. Hack Tool Apk
  15. Hack And Tools
  16. Tools Used For Hacking
  17. Hacker Tools For Pc
  18. Best Hacking Tools 2020
  19. Hacker Hardware Tools
  20. Hack Apps
  21. Pentest Automation Tools
  22. Pentest Tools For Windows
  23. Pentest Tools For Android
  24. Hacker Hardware Tools
  25. Hack Tools For Mac
  26. Pentest Recon Tools
  27. Physical Pentest Tools
  28. Tools For Hacker
  29. Hack Tools
  30. Black Hat Hacker Tools
  31. Pentest Tools For Android
  32. Game Hacking
  33. New Hacker Tools
  34. Growth Hacker Tools
  35. Hack Tools Pc
  36. Black Hat Hacker Tools
  37. Hacker Tools For Pc
  38. Pentest Tools Alternative
  39. Hack Tools Online
  40. Hack Tool Apk No Root
  41. Pentest Tools Url Fuzzer
  42. Hacker Tools Hardware
  43. Hack Tool Apk No Root
  44. Hacking Apps
  45. Hack Rom Tools
  46. Hack Tools 2019
  47. Best Hacking Tools 2019
  48. Pentest Tools Windows
  49. Pentest Tools Android
  50. Hacking Tools Kit
  51. Pentest Reporting Tools
  52. Pentest Tools Free
  53. Hacking Tools Name
  54. Pentest Tools Tcp Port Scanner
  55. Pentest Tools For Android
  56. Hacker Tools Apk
  57. Hack Tools 2019
  58. Hacking Tools Pc
  59. Hackers Toolbox
  60. New Hack Tools
  61. Game Hacking
  62. Hacker Hardware Tools
  63. Pentest Tools Nmap
  64. Hack Apps
  65. Easy Hack Tools
  66. Best Hacking Tools 2020
  67. Hacker Tools Software
  68. Pentest Tools Kali Linux
  69. Pentest Tools Tcp Port Scanner
  70. Hacker Tools For Pc
  71. Black Hat Hacker Tools
  72. Best Hacking Tools 2020
  73. Hacking Tools Download
  74. Hacking Tools Software
  75. Hacking Tools Software
  76. Wifi Hacker Tools For Windows
  77. Black Hat Hacker Tools
  78. Hacker Tools Linux
  79. Hack Apps
  80. Hacker Tools Software
  81. Wifi Hacker Tools For Windows
  82. Hack Website Online Tool
  83. What Are Hacking Tools
  84. Hacking Tools 2020
  85. Pentest Tools Apk
  86. Pentest Box Tools Download
  87. Hacker
  88. Pentest Tools Github
  89. Wifi Hacker Tools For Windows
  90. Tools 4 Hack
  91. Hacking Tools And Software
  92. Growth Hacker Tools
  93. Pentest Tools For Windows
  94. Hacker Tools 2020
  95. Best Hacking Tools 2020
  96. Pentest Tools Nmap
  97. Hack Tools For Ubuntu
  98. Pentest Tools Review
  99. How To Install Pentest Tools In Ubuntu
  100. Hacking Tools Name
  101. Hack Tools For Games
  102. Hacking Tools Download
  103. Pentest Tools Review
  104. Hacker Tools Mac
  105. Bluetooth Hacking Tools Kali
  106. Pentest Tools Review
  107. Hacker Tools Mac
  108. Hacking Tools For Games
  109. Hacking Tools For Pc
  110. Hack Tools For Pc
  111. Pentest Automation Tools
  112. Pentest Tools Linux
  113. Hacker Tools Online
  114. Best Pentesting Tools 2018
  115. Ethical Hacker Tools
  116. Hacking Tools Kit
  117. Hacking Tools 2020
  118. Hacking Tools For Windows 7
  119. Nsa Hack Tools

No comments:

Post a Comment