Scanning
Scanning
Types of Scanning:
1. Port Scanning
2. Vulnerability Scanning
o This scan sends a FIN (Finish) flag to the target port, which is
used to terminate a connection. Normally, no response should
be received if the port is closed, but a reset (RST) signal is
sent for open ports, which can help in identifying open ports.
o This scan sends a packet with the FIN, URG, and PSH flags set.
These flags are not typically used together, which can confuse
the target system. It is stealthier but can be detected by
modern firewalls and intrusion detection systems (IDS).
o
UDP Scanning:
While UDP scanning is generally less reliable than TCP scanning due to the
nature of UDP's connectionless protocol, it can still be important for
discovering open services on a network.
UDP Scan: This scan sends a packet to a target port and waits for a
response. If there is no response, it is assumed the port is open (or
filtered by a firewall). If a response is received (such as an ICMP port
unreachable message), it is considered closed.
Network Sniffing
1. Packet Capture:
2. Promiscuous Mode:
1. Network Monitoring:
2. Security Auditing:
3. Troubleshooting:
4. Packet Reconstruction:
5. Malicious Purposes:
1. Wireshark:
2. Tcpdump:
3. EtherApe:
4. WiFi Pineapple:
Ethical Considerations
1. Encryption:
o Use encrypted communication protocols (e.g., HTTPS,
SSL/TLS) to protect data in transit from being easily
intercepted.
4. Port Security:
2. Tcpdump
Features:
Use Cases:
Website: Tcpdump