The first step in the process of hacking



Yüklə 445 b.
tarix27.10.2017
ölçüsü445 b.
#16763



The first step in the process of hacking

  • The first step in the process of hacking

    • Discover the services
    • Version label
    • Operation System
  • Send few packets to the host



TCP Packet Header

  • TCP Packet Header







Is the host alive ?

  • Is the host alive ?

  • Method

    • Ping
      • nmap –sP 192.168.0.1


TCP connect

  • TCP connect

    • nmap –sT 192.168.0.1








Non-normal TCP operation

  • Non-normal TCP operation

  • Set the flags FIN,URG,PUSH

  • With –sX



Turn off all flags

  • Turn off all flags

  • With -sN







FTP Bounce

  • FTP Bounce



Time-based algorithm

  • Time-based algorithm

  • Using -T option



Who runs the process (-I)

  • Who runs the process (-I)



With –O flag

  • With –O flag



Nmap –O 192.168.0.1

  • Nmap –O 192.168.0.1



Scanning a Class C subnet

  • Scanning a Class C subnet



Port scans in IP section

  • Port scans in IP section



Netscantools

  • Netscantools

  • Superscan

  • IPEYE

  • WUPS



Yüklə 445 b.

Dostları ilə paylaş:




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©muhaz.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin