SlideShare a Scribd company logo
1 of 15
Download to read offline
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
ETHICAL
HACKING
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
SCANNING
 Scanning is the process of finding open/close ports, vulnerabilities in remote
system, server & networks.
It will reveal IP addresses, Operating systems, Services running on remote
computer.
Three types of scanning.
1. Port Scanning
2. Network Scanning
3. Vulnerability Scanning
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
SCANNING
Port Scanning:
is one of the most popular technique attacker uses to discover the service they break into.
is one of the most popular technique attacker uses to discover the service they break into.
It is one of the most popular technique attacker uses to discover the service they
break into.
 every machine connected to a LAN or connected to Internet via a modem
run many services that listen at well-known and not so well-known ports.
 There are 1 to 65535 ports are available in the computer.
 By port scanning the attacker finds which ports are available.
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
SCANNING
Ports:
The port numbers are unique only within a computer system.
 Port numbers are 16-bit unsigned numbers.
 The port numbers are divided into three ranges:
1. Well Known Ports (0..1023),
2. The Registered Ports (1024..49151),
3. The Dynamic and/or Private Ports (49152..65535).
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
SCANNING
Well Known Ports:
 echo 7/tcp Echo
 ftp-data 20/udp File Transfer [Default Data]
 ftp 21/tcp File Transfer [Control]
 ssh 22/tcp SSH Remote Login Protocol
 telnet 23/tcp Telnet
 domain 53/udp Domain Name Server
 www-http 80/tcp World Wide Web HTTP.
 Smtp 25/tcp Simple mail transfer protocol
 Whois 43/tcp Whois server
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
SCANNING
Regestered Ports:
 wins 1512/tcp Microsoft Windows Internet Name
Service
 radius 1812/udp RADIUS authentication protocol
 yahoo 5010 Yahoo! Messenger
 x11 6000-6063/tcp X Window System
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
SCANNING
 SYN - Synchronize - it is used to initiate connection between hosts.
 ACK - Acknowledgement - It is used to establish connection between hosts.
 PSH - push - tells receiving system to send all buffer data.
 URG - urgent - stats that data contain in packet should be process
immediately.
 FIN - finish - tells remote system that there will be no more
transmission.
 TTL - Time to Live.
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
SCANNING
Open Scan:
Known as TCP Scan and normally used to program sockets, this technique is
the oldest and works making a full connection with the server.
For that it makes an authentication with 3 packets. Is known as three-way-
handshake:
For the ports opened:
Client ----> SYN ---->
<---- SYN/ACK <---- Server
Client ----> ACK ---->
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
SCANNING
For the ports closed:
Client ----> SYN ---->
<---- RST <---- Server
Advantages : very easy to program.
 Disadvantages: is very easy to detect and make logs on each connection.
TCPConnect()
 The connect() system call provided by an OS is used to open a connection to
every interesting port on the machine.
 If the port is listening, connect() will succeed, otherwise the port isn't
reachable .
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
SCANNING
Stealth Scan:
 A stealth scan is a kind of scan that is designed to go undetected by auditing
tools.
 Fragmented Scan: The scanner splits the TCP header into several IP
fragments.
 This bypasses some packet filter firewalls because they cannot see a complete
TCP
 header that can match their filter rules.
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
SCANNING
SYN Scan:
 This technique is called half open scanning because a TCP connection is not
completed.
 A SYN packet is sent to remote computer.
 The target host responds with a SYN+ACK, this indicates the port is listening
and an RST indicates a non- listener.
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
SCANNING
FIN Scan:
 Another technique sends erroneous packets at a port, expecting that open
listening ports will send back different error messages than closed ports.
 Closed ports reply to fin packets with RST.
 Open ports ignore packets.
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
SCANNING
XMAS Scan:
 XMAS uses scans where all flags in the TCP packet are set & sent to target
host.
 Closed ports reply to packets with RST.
 Open ports ignore packets.
NULL Scan:
 Null Scan used no flags of TCP header & it sent to the target host.
 Closed ports reply to packets with RST.
 Open ports ignore packets.
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
SCANNING
Port Scanner: NMAP:
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
SCANNING
 Nmap is powerful utility to scan large number of tools.
 Provided with GUI as well as Command line interface.
 It is supported by many operating systems.
 It can carry out SYN Scan, FIN Scan, Stealth Scan, Half open scan & many
other types.

More Related Content

What's hot

Dcn (transmission control protocol) ppt
Dcn  (transmission control protocol) pptDcn  (transmission control protocol) ppt
Dcn (transmission control protocol) pptVijay Kumar
 
Password sniffing
Password sniffingPassword sniffing
Password sniffingSRIMCA
 
Network Protocol Analyzer
Network Protocol AnalyzerNetwork Protocol Analyzer
Network Protocol AnalyzerSourav Roy
 
Packet sniffing in LAN
Packet sniffing in LANPacket sniffing in LAN
Packet sniffing in LANArpit Suthar
 
Ethical Hacking - sniffing
Ethical Hacking - sniffingEthical Hacking - sniffing
Ethical Hacking - sniffingBhavya Chawla
 
Network Protocol Analyzer
Network Protocol AnalyzerNetwork Protocol Analyzer
Network Protocol AnalyzerSourav Roy
 
Attacks and their mitigations
Attacks and their mitigationsAttacks and their mitigations
Attacks and their mitigationsMukesh Chaudhari
 
Ccna1 v6.0 pretest exam answers 2018
Ccna1 v6.0 pretest exam answers 2018Ccna1 v6.0 pretest exam answers 2018
Ccna1 v6.0 pretest exam answers 2018Download Mipdfcom
 
CCNA 1 v6.0 Final Exam Answers Option B 2018
CCNA 1 v6.0 Final Exam Answers Option B  2018CCNA 1 v6.0 Final Exam Answers Option B  2018
CCNA 1 v6.0 Final Exam Answers Option B 2018Download Mipdfcom
 
Firewall
FirewallFirewall
FirewallMuuluu
 
Packet sniffer repot
Packet sniffer repotPacket sniffer repot
Packet sniffer repotKunal Thakur
 
Packet Sniffer
Packet Sniffer Packet Sniffer
Packet Sniffer vilss
 

What's hot (20)

Dcn (transmission control protocol) ppt
Dcn  (transmission control protocol) pptDcn  (transmission control protocol) ppt
Dcn (transmission control protocol) ppt
 
Password sniffing
Password sniffingPassword sniffing
Password sniffing
 
Network Protocol Analyzer
Network Protocol AnalyzerNetwork Protocol Analyzer
Network Protocol Analyzer
 
Firewalls
FirewallsFirewalls
Firewalls
 
Sniffing via dsniff
Sniffing via dsniffSniffing via dsniff
Sniffing via dsniff
 
Packet sniffing in LAN
Packet sniffing in LANPacket sniffing in LAN
Packet sniffing in LAN
 
Ethical Hacking - sniffing
Ethical Hacking - sniffingEthical Hacking - sniffing
Ethical Hacking - sniffing
 
Best!
Best!Best!
Best!
 
Arp Cache Poisoning
Arp Cache PoisoningArp Cache Poisoning
Arp Cache Poisoning
 
Network Protocol Analyzer
Network Protocol AnalyzerNetwork Protocol Analyzer
Network Protocol Analyzer
 
Attacks and their mitigations
Attacks and their mitigationsAttacks and their mitigations
Attacks and their mitigations
 
Wireshark Lab HTTP, DNS and ARP v7 solution
Wireshark Lab HTTP, DNS and ARP v7 solutionWireshark Lab HTTP, DNS and ARP v7 solution
Wireshark Lab HTTP, DNS and ARP v7 solution
 
Ccna1 v6.0 pretest exam answers 2018
Ccna1 v6.0 pretest exam answers 2018Ccna1 v6.0 pretest exam answers 2018
Ccna1 v6.0 pretest exam answers 2018
 
CCNA 1 v6.0 Final Exam Answers Option B 2018
CCNA 1 v6.0 Final Exam Answers Option B  2018CCNA 1 v6.0 Final Exam Answers Option B  2018
CCNA 1 v6.0 Final Exam Answers Option B 2018
 
Firewall
FirewallFirewall
Firewall
 
Packet sniffers
Packet sniffers Packet sniffers
Packet sniffers
 
Icmp
IcmpIcmp
Icmp
 
Packet Sniffing
Packet SniffingPacket Sniffing
Packet Sniffing
 
Packet sniffer repot
Packet sniffer repotPacket sniffer repot
Packet sniffer repot
 
Packet Sniffer
Packet Sniffer Packet Sniffer
Packet Sniffer
 

Similar to Scanning

A Survey on different Port Scanning Methods and the Tools used to perform the...
A Survey on different Port Scanning Methods and the Tools used to perform the...A Survey on different Port Scanning Methods and the Tools used to perform the...
A Survey on different Port Scanning Methods and the Tools used to perform the...Naomi Hansen
 
Module 3 Scanning
Module 3   ScanningModule 3   Scanning
Module 3 Scanningleminhvuong
 
Scanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptxScanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptxMahdiHasanSowrav
 
For your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and laFor your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and laShainaBoling829
 
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 FinalExploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Finalmasoodnt10
 
01204427-scanner.ppt
01204427-scanner.ppt01204427-scanner.ppt
01204427-scanner.pptVarunBehere1
 
Modul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.pptModul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.pptcemporku
 
modul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdfmodul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdftehkotak4
 
Scanning.pptx
Scanning.pptxScanning.pptx
Scanning.pptxJazzyB5
 
Network Security Nmap N Nessus
Network Security Nmap N NessusNetwork Security Nmap N Nessus
Network Security Nmap N NessusUtkarsh Verma
 
A REVIEW ON NMAP AND ITS FEATURES
A REVIEW ON NMAP AND ITS FEATURESA REVIEW ON NMAP AND ITS FEATURES
A REVIEW ON NMAP AND ITS FEATURESIRJET Journal
 
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...Boston Institute of Analytics
 

Similar to Scanning (20)

A Survey on different Port Scanning Methods and the Tools used to perform the...
A Survey on different Port Scanning Methods and the Tools used to perform the...A Survey on different Port Scanning Methods and the Tools used to perform the...
A Survey on different Port Scanning Methods and the Tools used to perform the...
 
Module 3 Scanning
Module 3   ScanningModule 3   Scanning
Module 3 Scanning
 
Scanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptxScanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptx
 
Ceh v5 module 03 scanning
Ceh v5 module 03 scanningCeh v5 module 03 scanning
Ceh v5 module 03 scanning
 
Port Scanning Overview
Port Scanning  OverviewPort Scanning  Overview
Port Scanning Overview
 
Contents namp
Contents nampContents namp
Contents namp
 
Contents namp
Contents nampContents namp
Contents namp
 
For your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and laFor your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and la
 
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 FinalExploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
 
01204427-scanner.ppt
01204427-scanner.ppt01204427-scanner.ppt
01204427-scanner.ppt
 
Port Scanning
Port ScanningPort Scanning
Port Scanning
 
Modul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.pptModul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.ppt
 
modul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdfmodul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdf
 
Scanning.pptx
Scanning.pptxScanning.pptx
Scanning.pptx
 
Network Security Nmap N Nessus
Network Security Nmap N NessusNetwork Security Nmap N Nessus
Network Security Nmap N Nessus
 
A REVIEW ON NMAP AND ITS FEATURES
A REVIEW ON NMAP AND ITS FEATURESA REVIEW ON NMAP AND ITS FEATURES
A REVIEW ON NMAP AND ITS FEATURES
 
6005679.ppt
6005679.ppt6005679.ppt
6005679.ppt
 
Firewall
FirewallFirewall
Firewall
 
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
 
Packet capturing
Packet capturingPacket capturing
Packet capturing
 

Recently uploaded

Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 

Recently uploaded (20)

Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 

Scanning

  • 1. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE ETHICAL HACKING
  • 2. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE SCANNING  Scanning is the process of finding open/close ports, vulnerabilities in remote system, server & networks. It will reveal IP addresses, Operating systems, Services running on remote computer. Three types of scanning. 1. Port Scanning 2. Network Scanning 3. Vulnerability Scanning
  • 3. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE SCANNING Port Scanning: is one of the most popular technique attacker uses to discover the service they break into. is one of the most popular technique attacker uses to discover the service they break into. It is one of the most popular technique attacker uses to discover the service they break into.  every machine connected to a LAN or connected to Internet via a modem run many services that listen at well-known and not so well-known ports.  There are 1 to 65535 ports are available in the computer.  By port scanning the attacker finds which ports are available.
  • 4. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE SCANNING Ports: The port numbers are unique only within a computer system.  Port numbers are 16-bit unsigned numbers.  The port numbers are divided into three ranges: 1. Well Known Ports (0..1023), 2. The Registered Ports (1024..49151), 3. The Dynamic and/or Private Ports (49152..65535).
  • 5. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE SCANNING Well Known Ports:  echo 7/tcp Echo  ftp-data 20/udp File Transfer [Default Data]  ftp 21/tcp File Transfer [Control]  ssh 22/tcp SSH Remote Login Protocol  telnet 23/tcp Telnet  domain 53/udp Domain Name Server  www-http 80/tcp World Wide Web HTTP.  Smtp 25/tcp Simple mail transfer protocol  Whois 43/tcp Whois server
  • 6. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE SCANNING Regestered Ports:  wins 1512/tcp Microsoft Windows Internet Name Service  radius 1812/udp RADIUS authentication protocol  yahoo 5010 Yahoo! Messenger  x11 6000-6063/tcp X Window System
  • 7. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE SCANNING  SYN - Synchronize - it is used to initiate connection between hosts.  ACK - Acknowledgement - It is used to establish connection between hosts.  PSH - push - tells receiving system to send all buffer data.  URG - urgent - stats that data contain in packet should be process immediately.  FIN - finish - tells remote system that there will be no more transmission.  TTL - Time to Live.
  • 8. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE SCANNING Open Scan: Known as TCP Scan and normally used to program sockets, this technique is the oldest and works making a full connection with the server. For that it makes an authentication with 3 packets. Is known as three-way- handshake: For the ports opened: Client ----> SYN ----> <---- SYN/ACK <---- Server Client ----> ACK ---->
  • 9. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE SCANNING For the ports closed: Client ----> SYN ----> <---- RST <---- Server Advantages : very easy to program.  Disadvantages: is very easy to detect and make logs on each connection. TCPConnect()  The connect() system call provided by an OS is used to open a connection to every interesting port on the machine.  If the port is listening, connect() will succeed, otherwise the port isn't reachable .
  • 10. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE SCANNING Stealth Scan:  A stealth scan is a kind of scan that is designed to go undetected by auditing tools.  Fragmented Scan: The scanner splits the TCP header into several IP fragments.  This bypasses some packet filter firewalls because they cannot see a complete TCP  header that can match their filter rules.
  • 11. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE SCANNING SYN Scan:  This technique is called half open scanning because a TCP connection is not completed.  A SYN packet is sent to remote computer.  The target host responds with a SYN+ACK, this indicates the port is listening and an RST indicates a non- listener.
  • 12. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE SCANNING FIN Scan:  Another technique sends erroneous packets at a port, expecting that open listening ports will send back different error messages than closed ports.  Closed ports reply to fin packets with RST.  Open ports ignore packets.
  • 13. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE SCANNING XMAS Scan:  XMAS uses scans where all flags in the TCP packet are set & sent to target host.  Closed ports reply to packets with RST.  Open ports ignore packets. NULL Scan:  Null Scan used no flags of TCP header & it sent to the target host.  Closed ports reply to packets with RST.  Open ports ignore packets.
  • 14. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE SCANNING Port Scanner: NMAP:
  • 15. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE SCANNING  Nmap is powerful utility to scan large number of tools.  Provided with GUI as well as Command line interface.  It is supported by many operating systems.  It can carry out SYN Scan, FIN Scan, Stealth Scan, Half open scan & many other types.