Skip to content

Latest commit

 

History

History
81 lines (62 loc) · 2.59 KB

Footprinting_and_scanning.md

File metadata and controls

81 lines (62 loc) · 2.59 KB

Footprinting & scanning

Back to cyber security page


Mapping network & scanning targets

  • By mapping networks , we can get insights of connected network and current running devices and there ip addresses.
  • We can scan each machine to find details about OS so we can get idea about what system are there. Also finger printing OS , we can search vulnerabilities about system by even googling.
  • Getting permission is MUST
  • Scanning network without permission is cyber OFFENCE

How to do scanning?

First we need ip of network to scan.

  • Ping
    • ping 192.168.0.1
    • Pinging is utility that is designed to test if a machine is live.
    • Pinging sents ICMP packets , if we get echo reply then host is alive

  • Fping
    • fping -a -g 192.168.0.1/24
    • fping -a -g 192.168.0.1 192.186.0.100
    • Fping is linux tool which is improved ping . We can sweep ping ip's.

  • nmap

Port scanning methods

TCP Port scanner

TCP_IP_3_way_handshake


About TCP TCP Full Scan

  • To detect if port is open If 3 way handshake is completed then we send RST + ACK packet to close connection.
  • If after SYN request we get RST + ACK from server then port is closed.
  • Although this type of scan will be easily detected & also recorded in logs as many connection coming from one device can be blocked.
  • namp -sT 192.168.0.125 TCP SYN scan | 600

TCP SYN Scan

  • Stealthy scan is another name.
  • It only send SYN and analyzes response coming back form target machine
  • If RST then port is closed and ACK then port is open(Sends RST to stop handshake).
  • namp -sS 192.168.0.125 TCP SYN scan | 600

About UDP UDP Scan

  • UDP scans are slower
  • If reponse is ICMP packet then port is closed
  • If reponse is not there then open|filtered
  • As UDP is connection-less so determining state is tough

OS Fingerprinting

What is OS fingerprinting

  • OS fingerprinting means getting knowledge about OS .
  • By getting approx knowledge about OS , we can find vulnerabilities based on version and security level of OS.

Tools:


Sources :