Module+6
Module+6
Module+6
Scanning
Ansh Bhawnani
Basics of Scanning
Module 6
Basics of Scanning
3
Basics of Scanning
Module 6
1. Checking for Live
Systems
Module 6
Checking for Live Systems
7
Checking for Live Systems
▰ Ping Sweep:
▻ Used to determine the live hosts from a range of IP
addresses by sending ICMP ECHO requests to multiple
hosts.
▻ If a host is live, it will return an ICMP ECHO reply.
▻ Attackers calculate subnet masks using Subnet Mask
Calculators to identify the number of hosts present in the
subnet.
▻ Attackers then use ping sweep to create an inventory of live
systems in the subnet.
8
2. TCP 3-Way
Handshake
Module 6
TCP 3-Way Handshake
11
TCP 3-Way Handshake
12
3. Check for open
ports (Port
Scanning)
Module 6
Port Scanning
Module 6
Port Scanning Methodology
17
Port Scanning Methodology
18
Scanning Techniques
20
Scanning Techniques
21
Scanning Techniques
23
Scanning Techniques
24
Scanning Techniques
25
Scanning Techniques
28
Banner Grabbing
Module 6
Banner Grabbing
30
Banner Grabbing
31
Banner Grabbing
32
Banner Grabbing
Module 6
Evading IDS, Firewalls
35
Scanning for
Vulnerabilities
Module 6
Scanning for Vulnerabilities
37
Mapping Networks
(Visual Mapping)
Module 6
Network Visual Mapping
▰ Drawing target's network diagram gives valuable information about the network
and its architecture to an attacker.
▰ Network diagram shows logical or physical path to a potential target.
Module 6
Countermeasures
41
Countermeasures
45
Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.
Alternative Proxies: