Module+6
Module+6
Module+6
Scanning
Ansh Bhawnani
Basics of Scanning
Module 6
Basics of Scanning
3
Basics of Scanning
Module 6
1. Checking for Live
Systems
Module 6
Checking for Live Systems
7
Checking for Live Systems
▰ Ping Sweep:
▻ Used to determine the live hosts from a range of IP
addresses by sending ICMP ECHO requests to multiple
hosts.
▻ If a host is live, it will return an ICMP ECHO reply.
▻ Attackers calculate subnet masks using Subnet Mask
Calculators to identify the number of hosts present in the
subnet.
▻ Attackers then use ping sweep to create an inventory of live
systems in the subnet.
8
2. TCP 3-Way
Handshake
Module 6
TCP 3-Way Handshake
11
TCP 3-Way Handshake
12
3. Check for open
ports (Port
Scanning)
Module 6
Port Scanning
Module 6
Port Scanning Methodology
17
Port Scanning Methodology
18
Scanning Techniques
20
Scanning Techniques
21
Scanning Techniques
23
Scanning Techniques
24
Scanning Techniques
25
Scanning Techniques
28
Banner Grabbing
Module 6
Banner Grabbing
30
Banner Grabbing
31
Banner Grabbing
32
Banner Grabbing
Module 6
Evading IDS, Firewalls
35
Scanning for
Vulnerabilities
Module 6
Scanning for Vulnerabilities
37
Mapping Networks
(Visual Mapping)
Module 6
Network Visual Mapping
▰ Drawing target's network diagram gives valuable information about the network
and its architecture to an attacker.
▰ Network diagram shows logical or physical path to a potential target.
Module 6
Countermeasures
41
Countermeasures
45