Ethical Hacking Tutorials - What is Scanning?
Scanning is Important to Both Attackers and Those Responsible for Security Hosts and Networks.
Types of Scanning
Port Scanning - Check Open Ports and Services of the target system.
Networking Scanning - Check IP Address, Live Host of the target systemVulnerability Scanning - Chech Presence of Known Weaknesses this process an attacker can find the newest Vulnerability
Searching for Vulnerabilities
If there's an exploit available, he will run it against the server and take complete control. If there isn't any, he would move on to another open port and try again on different services.
What is 0-Day Scanning
Nonone knows about the vulnerability so the Hacker could start hacking hundreds of website before the vulnerability is discovered and patched.
The hacker could sell the vulnerability for thousands of dollars.
Discovering vulnerabilities and creating an exploit for it shows that the hacker is very skillful and raises his ranks in the hacker's community.
The Big Vulnerabilities Discovered By Example
- Denial-of-Service Attacks (DOS)
- Buffer Overflow Attacks (BOF)
- SQL Injection Attacks (SQL)
What are the Ports?
Port is a logical connection that allows data to be sent from one application to another directly. There are 65,536 available ports on a computer, with the first 1,024 beings well-known ports (0-1023)What is Services?
Service a process requiring no user interaction that runs on a computer and facilitates the functioning of the computer operating system and associated applications.Example - Telnet,FTP
Steps follow for Scanning System by a Hacker
Step 1: Check for Live System (Example PING or PING SWEEP)
Step 2: Chech for Open Ports (Example c:windows\system32\drivers\etc)
Step 3: Banner Grabbing
Step 4: Prepare Proxy (IMPORTANT - Don't Try to be a Suicide Hackers)
Step 5: Scan for Vulnerability
Step 6: Draw Network Diagram or Maps.
There are Some Tools for Scanning
- Angry IP Scanner
- NEXPOSE
- Nessus
- NMAP(This is the best tools for scanning)
Tags: what is scanning,scanning,what is scanning used to,what is random scanning,what is raster scanning,what is network scanning,what is interaced scanning,what is switch access scanning,what is network scanning in hindi,what is the meaning of switch access scanning,3d laser scanning,ceh v9 scanning,what is the definition of switch access scanning,what is scan conversion
No comments:
Post a Comment