Monday, June 5, 2023

CEH: Gathering Network And Host Information, Types Of Scan


In Hacking the main focus is over gathering the information about victim or victim's machine. Which will help to find out which type of exploit will works according to the given circumstances. Gathering the network and host information means to find out by which network, the which victim's machine is connected and communicating over the network. Moreover, scanning is also performed for gathering information about open and closed ports. After that they'll able to find the vulnerabilities in the target system and try to get access to the system.

Types Of Scan

As a CEH you should know the scan types and uses:

SYN

SYN scan doesn't complete the TCP three way handshake that is why it is known as a half-open scan. An attacker send a SYN packet to the victim machine if SYN/ACK packet is received back to attacker, then it clarify that the port is listening due to the acknowledgment by the victim that it has completed the connection. While if the attacker is received the RST/ACK packet then it assumed that the port is closed or open.


XMAS

XMAS scan works only on target system that has the RFC 793 development of TCP/IP and it doesn't works against any version of windows.
XMAS scan send a packet with by setting up the FIN, URG and PSH flags of the TCP header. The function of this scan is if the port is active there will be no response but if the port is closed the target responds with a RST/ACK packet.


FIN

A FIN scan send a packet by setting up only the FIN flag of the TCP. This scan is similar to XMAS scan. FIN scan receives no response if the port is active while if the port is closed it receives the RST/ACK packet.


NULL 

NULL scan is also similar to the XMAS scan. But the only difference is that it sends a packet without setting up the any flag of TCP header. NULL scan receives no response if the port is open but if the port is closed it receives the RST/ACK packet.


IDLE

It is just like spoofing an IP address by sending a SYN packet to the victim's machine to find out which services are available over the system. This scan is completed with the help of another system called as "Zombie" (that is not receiving or transmitting any information).


Related links

  1. Hacker Tools Hardware
  2. Pentest Tools Kali Linux
  3. Hacking Tools And Software
  4. Pentest Recon Tools
  5. Hack Tools For Ubuntu
  6. Black Hat Hacker Tools
  7. Hacking Tools Name
  8. Termux Hacking Tools 2019
  9. Nsa Hacker Tools
  10. Pentest Tools List
  11. Hack Tools
  12. Pentest Tools For Android
  13. Hacker Tools Github
  14. Best Hacking Tools 2019
  15. Hacker Tools For Pc
  16. Game Hacking
  17. Hacking Tools Kit
  18. Nsa Hack Tools Download
  19. Pentest Tools Website
  20. Pentest Tools
  21. Hacking Tools For Windows 7
  22. Nsa Hack Tools Download
  23. Hack Tools Github
  24. Pentest Tools Bluekeep
  25. Hacking Tools Usb
  26. Pentest Tools For Android
  27. Hacker Tools For Windows
  28. Hacking Tools For Windows Free Download
  29. Hacking App
  30. Black Hat Hacker Tools
  31. Pentest Tools Github
  32. Hacking Tools For Beginners
  33. Hackrf Tools
  34. Hacker Tools
  35. Hacking Tools
  36. Termux Hacking Tools 2019
  37. Pentest Tools For Windows
  38. Hack Tool Apk No Root
  39. Hacking Tools For Games
  40. Wifi Hacker Tools For Windows
  41. Hack Tools 2019
  42. Android Hack Tools Github
  43. Hacking Tools For Windows Free Download
  44. Pentest Tools Github
  45. Github Hacking Tools
  46. Hacking Tools Hardware
  47. Tools Used For Hacking
  48. Hak5 Tools
  49. Hacking Tools Hardware
  50. Hacker Tools Online
  51. Hacker Search Tools
  52. Hack Tools Online
  53. Pentest Tools Review
  54. Pentest Tools Alternative
  55. Pentest Tools Alternative
  56. Nsa Hack Tools Download
  57. Hackrf Tools
  58. Hacking App
  59. Nsa Hack Tools
  60. Hacker Tools Free Download
  61. Pentest Tools Github
  62. Hacker Tools Free Download
  63. Pentest Recon Tools
  64. Hacking Tools
  65. Pentest Tools For Android
  66. Hacking Tools For Kali Linux
  67. Pentest Tools For Android
  68. Hacking Tools Github
  69. Pentest Recon Tools
  70. Pentest Recon Tools
  71. Hack Apps
  72. Termux Hacking Tools 2019
  73. Wifi Hacker Tools For Windows
  74. Hacking Tools Free Download
  75. Hacker Tools For Ios
  76. Hacking Tools For Windows
  77. Hacking Apps
  78. Termux Hacking Tools 2019
  79. Hack Rom Tools
  80. Hacker Tools For Ios
  81. How To Hack
  82. Growth Hacker Tools
  83. Pentest Tools For Android
  84. New Hacker Tools
  85. Pentest Tools For Android

No comments:

Post a Comment