Ethical Overflow - A new focus on Cyber Security

Ethical Hacking - Overview

Ethical Hacking: Scanning

Scanning is the Second Step Of a Hacker

-Scanning is important for both attackers and those responsible for security hosts and network.

Types of scanning:

Port Scanning
Port scanning is the process of connecting to TCP and UDP ports for the purpose of finding what services and applications are open on the target device. Once open, applications or services can be discovered. At this point, further information is typically gathered to determine how best to target any vulnerabilities and weaknesses in the system.

Types of port scanning
-Vannila: The Scanner attempts to connect to all 65,535 ports.
-Strobs: A more focused scan Looing Only for Known service to exploit.
-Fragmented packets: The scanner send packets That get through simple packets filter in a firewall.
-UDP:The scanner looks for open UDP ports.
-Sweep:The scanner connect to the same ports on more than one machine.
-FTP Bounce: The scanner Goes through an FTP server in order to disguise the source of the scan.
-Stealth Scan: The scanner blocks the scanned computer from recording the port scan activities.

Network Scanning:
Network scanning is procedure for identifying active hosts on a network,scanning procedure,such as ping sweep and port scan s,return information about which IP address
map to live hosts that are active on the internet and what service they offer

vulnerabilities scanning:
Vulnerability scanning is a security technique used to identify security weaknesses in a computer system. Vulnerability scanning can be used by individuals or network administrators for security purposes, or it can be used by hackers attempting to gain unauthorized access to computer systems.

PORT:-

Port is a logical connection that allows data to be sent from one application to another directly; there are 65,536 avialable ports on a computer with the first 1024 ports being are well known ports.

Steps Follow For Scanning By A Hacker

-Checking for live system (Ping or Ping Sweep).
-Check for open ports(c:\windows\system32\driver\etc).
-Banner grabbing.
-prepare proxy.
-scan for vernerability.
-Draw network diagram.

PING

ping is a computer network administration software utility  used to test the reachability of a host on an Internet Protocol (IP) network. It measures the round -trip time for messages sent from the originating host to a destination computer that are echoed back to the source. 

PING SWEEP

A ping sweep (also known as an ICMP sweep) is a basic network scanning technique used to determine which of a range of IP address map to live hosts (computers). Whereas a single ping will tell you whether one specified host computer exists on the network, a ping sweep consists of ICMP (Internet Control Message Protocol) ECHO requests sent to multiple hosts. If a given address is live, it will return an ICMP ECHO reply. Ping sweeps are among the older and slower methods used to scan a network.

PING AND PING SWEEP TOOL

-Angry IP scaner
-Zenmap
-Ping sweep
-Ping Monitor
-Ultra ping pro
-Visual Ping tester
-Ping scanner pro
-Ping info view

MORE TOOLS USING IN SCANNING

-Advance IP scanner
-Curr ports
-Net tools
-Netscan tools pro
-SoftPerfect network scanner
-GFI Langaurd
-Nexpose
-ID Serve
-Lansurveyor
-Network view
-Angry Ip scanner
-Friendly pingerR
-Nessus