Saturday, January 20, 2024

CEH: Gathering Network And Host Information, Types Of Scan


In Hacking the main focus is over gathering the information about victim or victim's machine. Which will help to find out which type of exploit will works according to the given circumstances. Gathering the network and host information means to find out by which network, the which victim's machine is connected and communicating over the network. Moreover, scanning is also performed for gathering information about open and closed ports. After that they'll able to find the vulnerabilities in the target system and try to get access to the system.

Types Of Scan

As a CEH you should know the scan types and uses:

SYN

SYN scan doesn't complete the TCP three way handshake that is why it is known as a half-open scan. An attacker send a SYN packet to the victim machine if SYN/ACK packet is received back to attacker, then it clarify that the port is listening due to the acknowledgment by the victim that it has completed the connection. While if the attacker is received the RST/ACK packet then it assumed that the port is closed or open.


XMAS

XMAS scan works only on target system that has the RFC 793 development of TCP/IP and it doesn't works against any version of windows.
XMAS scan send a packet with by setting up the FIN, URG and PSH flags of the TCP header. The function of this scan is if the port is active there will be no response but if the port is closed the target responds with a RST/ACK packet.


FIN

A FIN scan send a packet by setting up only the FIN flag of the TCP. This scan is similar to XMAS scan. FIN scan receives no response if the port is active while if the port is closed it receives the RST/ACK packet.


NULL 

NULL scan is also similar to the XMAS scan. But the only difference is that it sends a packet without setting up the any flag of TCP header. NULL scan receives no response if the port is open but if the port is closed it receives the RST/ACK packet.


IDLE

It is just like spoofing an IP address by sending a SYN packet to the victim's machine to find out which services are available over the system. This scan is completed with the help of another system called as "Zombie" (that is not receiving or transmitting any information).


Related news
  1. Hacker Tools For Mac
  2. Hacking Tools Free Download
  3. Pentest Tools Linux
  4. Computer Hacker
  5. Pentest Tools Url Fuzzer
  6. Pentest Tools Framework
  7. Best Pentesting Tools 2018
  8. Hack Tools For Pc
  9. Wifi Hacker Tools For Windows
  10. Hack Tools For Windows
  11. Hacking Tools Name
  12. Hacking Tools Usb
  13. Hacker Tools 2019
  14. Pentest Tools Alternative
  15. Underground Hacker Sites
  16. Hack Tools
  17. Black Hat Hacker Tools
  18. Tools 4 Hack
  19. How To Make Hacking Tools
  20. Hack Tools Download
  21. New Hack Tools
  22. Pentest Tools For Android
  23. Pentest Tools Find Subdomains
  24. Hack Tools For Games
  25. Hack Website Online Tool
  26. Hacking Tools For Beginners
  27. Pentest Reporting Tools
  28. Hacker Tools Apk
  29. Hack Tools Download
  30. Hack Tools 2019
  31. Pentest Tools List
  32. Hacker Tools Hardware
  33. Hacker Tools Online
  34. Best Hacking Tools 2019
  35. What Are Hacking Tools
  36. Best Hacking Tools 2019
  37. Hack App
  38. Termux Hacking Tools 2019
  39. Hacking Tools For Windows
  40. Hacking Tools For Beginners
  41. Hack Tools Pc
  42. Hacking Tools Download
  43. Hacking Tools 2020
  44. Hack Apps
  45. Pentest Tools Nmap
  46. Hacker Tools For Mac
  47. Pentest Tools Open Source
  48. Install Pentest Tools Ubuntu
  49. Hacking Tools Free Download
  50. Hacker Tool Kit
  51. Nsa Hack Tools
  52. Pentest Tools For Windows
  53. Bluetooth Hacking Tools Kali
  54. Hacking Tools Free Download
  55. Hacker Security Tools
  56. Pentest Box Tools Download
  57. Hacker Tools Linux
  58. Hacker Tools For Pc
  59. Hacker Tool Kit
  60. World No 1 Hacker Software
  61. Hack Tools
  62. Underground Hacker Sites
  63. Hacker Security Tools
  64. Hacker Tools For Mac
  65. Hacking Tools 2019
  66. Hacker Tools
  67. Hack Tools For Mac
  68. Android Hack Tools Github
  69. Underground Hacker Sites
  70. Hack App
  71. Pentest Tools Alternative
  72. Hacker Hardware Tools
  73. Hacking Tools For Mac
  74. Hacker Security Tools
  75. New Hack Tools
  76. Hacking Tools For Beginners
  77. Pentest Tools
  78. Pentest Recon Tools
  79. Hack And Tools
  80. Wifi Hacker Tools For Windows
  81. Black Hat Hacker Tools
  82. Pentest Tools Open Source
  83. What Are Hacking Tools
  84. Ethical Hacker Tools
  85. Hacker Tools 2020
  86. Best Hacking Tools 2020
  87. Pentest Recon Tools
  88. What Are Hacking Tools
  89. Hacking Tools For Mac
  90. Pentest Automation Tools
  91. Hack Tool Apk
  92. Hacking Tools Usb
  93. Best Hacking Tools 2019
  94. Hacking Tools For Games
  95. Hacking Tools Mac
  96. Ethical Hacker Tools
  97. Pentest Tools Nmap
  98. Hacking Tools Github
  99. Pentest Tools Bluekeep
  100. Pentest Tools Kali Linux
  101. Pentest Tools Tcp Port Scanner
  102. What Is Hacking Tools
  103. Hacking Tools 2020
  104. Hack Tools
  105. Pentest Reporting Tools
  106. Beginner Hacker Tools
  107. Hack Tool Apk No Root
  108. Black Hat Hacker Tools
  109. Termux Hacking Tools 2019
  110. Pentest Tools Subdomain
  111. Hacking App
  112. Hacking Apps
  113. Tools For Hacker
  114. Pentest Recon Tools
  115. Hacking Tools Online
  116. Hack Tools
  117. Hack Tools Mac

No comments:

Post a Comment