SlideShare a Scribd company logo
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
ETHICAL
HACKING
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
SCANNING
 Scanning is the process of finding open/close ports, vulnerabilities in remote
system, server & networks.
It will reveal IP addresses, Operating systems, Services running on remote
computer.
Three types of scanning.
1. Port Scanning
2. Network Scanning
3. Vulnerability Scanning
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
SCANNING
Port Scanning:
is one of the most popular technique attacker uses to discover the service they break into.
is one of the most popular technique attacker uses to discover the service they break into.
It is one of the most popular technique attacker uses to discover the service they
break into.
 every machine connected to a LAN or connected to Internet via a modem
run many services that listen at well-known and not so well-known ports.
 There are 1 to 65535 ports are available in the computer.
 By port scanning the attacker finds which ports are available.
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
SCANNING
Ports:
The port numbers are unique only within a computer system.
 Port numbers are 16-bit unsigned numbers.
 The port numbers are divided into three ranges:
1. Well Known Ports (0..1023),
2. The Registered Ports (1024..49151),
3. The Dynamic and/or Private Ports (49152..65535).
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
SCANNING
Well Known Ports:
 echo 7/tcp Echo
 ftp-data 20/udp File Transfer [Default Data]
 ftp 21/tcp File Transfer [Control]
 ssh 22/tcp SSH Remote Login Protocol
 telnet 23/tcp Telnet
 domain 53/udp Domain Name Server
 www-http 80/tcp World Wide Web HTTP.
 Smtp 25/tcp Simple mail transfer protocol
 Whois 43/tcp Whois server
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
SCANNING
Regestered Ports:
 wins 1512/tcp Microsoft Windows Internet Name
Service
 radius 1812/udp RADIUS authentication protocol
 yahoo 5010 Yahoo! Messenger
 x11 6000-6063/tcp X Window System
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
SCANNING
 SYN - Synchronize - it is used to initiate connection between hosts.
 ACK - Acknowledgement - It is used to establish connection between hosts.
 PSH - push - tells receiving system to send all buffer data.
 URG - urgent - stats that data contain in packet should be process
immediately.
 FIN - finish - tells remote system that there will be no more
transmission.
 TTL - Time to Live.
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
SCANNING
Open Scan:
Known as TCP Scan and normally used to program sockets, this technique is
the oldest and works making a full connection with the server.
For that it makes an authentication with 3 packets. Is known as three-way-
handshake:
For the ports opened:
Client ----> SYN ---->
<---- SYN/ACK <---- Server
Client ----> ACK ---->
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
SCANNING
For the ports closed:
Client ----> SYN ---->
<---- RST <---- Server
Advantages : very easy to program.
 Disadvantages: is very easy to detect and make logs on each connection.
TCPConnect()
 The connect() system call provided by an OS is used to open a connection to
every interesting port on the machine.
 If the port is listening, connect() will succeed, otherwise the port isn't
reachable .
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
SCANNING
Stealth Scan:
 A stealth scan is a kind of scan that is designed to go undetected by auditing
tools.
 Fragmented Scan: The scanner splits the TCP header into several IP
fragments.
 This bypasses some packet filter firewalls because they cannot see a complete
TCP
 header that can match their filter rules.
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
SCANNING
SYN Scan:
 This technique is called half open scanning because a TCP connection is not
completed.
 A SYN packet is sent to remote computer.
 The target host responds with a SYN+ACK, this indicates the port is listening
and an RST indicates a non- listener.
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
SCANNING
FIN Scan:
 Another technique sends erroneous packets at a port, expecting that open
listening ports will send back different error messages than closed ports.
 Closed ports reply to fin packets with RST.
 Open ports ignore packets.
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
SCANNING
XMAS Scan:
 XMAS uses scans where all flags in the TCP packet are set & sent to target
host.
 Closed ports reply to packets with RST.
 Open ports ignore packets.
NULL Scan:
 Null Scan used no flags of TCP header & it sent to the target host.
 Closed ports reply to packets with RST.
 Open ports ignore packets.
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
SCANNING
Port Scanner: NMAP:
DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE
SCANNING
 Nmap is powerful utility to scan large number of tools.
 Provided with GUI as well as Command line interface.
 It is supported by many operating systems.
 It can carry out SYN Scan, FIN Scan, Stealth Scan, Half open scan & many
other types.

More Related Content

What's hot

Dcn (transmission control protocol) ppt
Dcn  (transmission control protocol) pptDcn  (transmission control protocol) ppt
Dcn (transmission control protocol) ppt
Vijay Kumar
 
Password sniffing
Password sniffingPassword sniffing
Password sniffing
SRIMCA
 
Network Protocol Analyzer
Network Protocol AnalyzerNetwork Protocol Analyzer
Network Protocol AnalyzerSourav Roy
 
Firewalls
FirewallsFirewalls
Firewalls
hemantag
 
Packet sniffing in LAN
Packet sniffing in LANPacket sniffing in LAN
Packet sniffing in LAN
Arpit Suthar
 
Ethical Hacking - sniffing
Ethical Hacking - sniffingEthical Hacking - sniffing
Ethical Hacking - sniffing
Bhavya Chawla
 
Arp Cache Poisoning
Arp Cache PoisoningArp Cache Poisoning
Arp Cache Poisoning
Subhash Kumar Singh
 
Network Protocol Analyzer
Network Protocol AnalyzerNetwork Protocol Analyzer
Network Protocol AnalyzerSourav Roy
 
Attacks and their mitigations
Attacks and their mitigationsAttacks and their mitigations
Attacks and their mitigations
Mukesh Chaudhari
 
Wireshark Lab HTTP, DNS and ARP v7 solution
Wireshark Lab HTTP, DNS and ARP v7 solutionWireshark Lab HTTP, DNS and ARP v7 solution
Wireshark Lab HTTP, DNS and ARP v7 solution
United International University
 
Ccna1 v6.0 pretest exam answers 2018
Ccna1 v6.0 pretest exam answers 2018Ccna1 v6.0 pretest exam answers 2018
Ccna1 v6.0 pretest exam answers 2018
Download Mipdfcom
 
CCNA 1 v6.0 Final Exam Answers Option B 2018
CCNA 1 v6.0 Final Exam Answers Option B  2018CCNA 1 v6.0 Final Exam Answers Option B  2018
CCNA 1 v6.0 Final Exam Answers Option B 2018
Download Mipdfcom
 
Firewall
FirewallFirewall
Firewall
Muuluu
 
Packet sniffers
Packet sniffers Packet sniffers
Packet sniffers
Ravi Teja Reddy
 
Packet Sniffing
Packet SniffingPacket Sniffing
Packet Sniffing
Mohammed Farrah
 
Packet sniffer repot
Packet sniffer repotPacket sniffer repot
Packet sniffer repotKunal Thakur
 
Packet Sniffer
Packet Sniffer Packet Sniffer
Packet Sniffer
vilss
 

What's hot (20)

Dcn (transmission control protocol) ppt
Dcn  (transmission control protocol) pptDcn  (transmission control protocol) ppt
Dcn (transmission control protocol) ppt
 
Password sniffing
Password sniffingPassword sniffing
Password sniffing
 
Network Protocol Analyzer
Network Protocol AnalyzerNetwork Protocol Analyzer
Network Protocol Analyzer
 
Firewalls
FirewallsFirewalls
Firewalls
 
Sniffing via dsniff
Sniffing via dsniffSniffing via dsniff
Sniffing via dsniff
 
Packet sniffing in LAN
Packet sniffing in LANPacket sniffing in LAN
Packet sniffing in LAN
 
Ethical Hacking - sniffing
Ethical Hacking - sniffingEthical Hacking - sniffing
Ethical Hacking - sniffing
 
Best!
Best!Best!
Best!
 
Arp Cache Poisoning
Arp Cache PoisoningArp Cache Poisoning
Arp Cache Poisoning
 
Network Protocol Analyzer
Network Protocol AnalyzerNetwork Protocol Analyzer
Network Protocol Analyzer
 
Attacks and their mitigations
Attacks and their mitigationsAttacks and their mitigations
Attacks and their mitigations
 
Wireshark Lab HTTP, DNS and ARP v7 solution
Wireshark Lab HTTP, DNS and ARP v7 solutionWireshark Lab HTTP, DNS and ARP v7 solution
Wireshark Lab HTTP, DNS and ARP v7 solution
 
Ccna1 v6.0 pretest exam answers 2018
Ccna1 v6.0 pretest exam answers 2018Ccna1 v6.0 pretest exam answers 2018
Ccna1 v6.0 pretest exam answers 2018
 
CCNA 1 v6.0 Final Exam Answers Option B 2018
CCNA 1 v6.0 Final Exam Answers Option B  2018CCNA 1 v6.0 Final Exam Answers Option B  2018
CCNA 1 v6.0 Final Exam Answers Option B 2018
 
Firewall
FirewallFirewall
Firewall
 
Packet sniffers
Packet sniffers Packet sniffers
Packet sniffers
 
Icmp
IcmpIcmp
Icmp
 
Packet Sniffing
Packet SniffingPacket Sniffing
Packet Sniffing
 
Packet sniffer repot
Packet sniffer repotPacket sniffer repot
Packet sniffer repot
 
Packet Sniffer
Packet Sniffer Packet Sniffer
Packet Sniffer
 

Similar to Scanning

A Survey on different Port Scanning Methods and the Tools used to perform the...
A Survey on different Port Scanning Methods and the Tools used to perform the...A Survey on different Port Scanning Methods and the Tools used to perform the...
A Survey on different Port Scanning Methods and the Tools used to perform the...
Naomi Hansen
 
Module 3 Scanning
Module 3   ScanningModule 3   Scanning
Module 3 Scanningleminhvuong
 
Scanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptxScanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptx
MahdiHasanSowrav
 
Ceh v5 module 03 scanning
Ceh v5 module 03 scanningCeh v5 module 03 scanning
Ceh v5 module 03 scanning
Vi Tính Hoàng Nam
 
Port Scanning Overview
Port Scanning  OverviewPort Scanning  Overview
Contents namp
Contents nampContents namp
Contents namp
shwetha mk
 
Contents namp
Contents nampContents namp
Contents namp
shwetha mk
 
For your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and laFor your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and la
ShainaBoling829
 
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 FinalExploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Finalmasoodnt10
 
01204427-scanner.ppt
01204427-scanner.ppt01204427-scanner.ppt
01204427-scanner.ppt
VarunBehere1
 
Port Scanning
Port ScanningPort Scanning
Port Scanning
amiable_indian
 
Modul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.pptModul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.ppt
cemporku
 
modul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdfmodul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdf
tehkotak4
 
Scanning.pptx
Scanning.pptxScanning.pptx
Scanning.pptx
JazzyB5
 
Network Security Nmap N Nessus
Network Security Nmap N NessusNetwork Security Nmap N Nessus
Network Security Nmap N NessusUtkarsh Verma
 
A REVIEW ON NMAP AND ITS FEATURES
A REVIEW ON NMAP AND ITS FEATURESA REVIEW ON NMAP AND ITS FEATURES
A REVIEW ON NMAP AND ITS FEATURES
IRJET Journal
 
6005679.ppt
6005679.ppt6005679.ppt
6005679.ppt
AlmaOraevi
 
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
Boston Institute of Analytics
 
Packet capturing
Packet capturingPacket capturing
Packet capturing
PankajSingh1035
 

Similar to Scanning (20)

A Survey on different Port Scanning Methods and the Tools used to perform the...
A Survey on different Port Scanning Methods and the Tools used to perform the...A Survey on different Port Scanning Methods and the Tools used to perform the...
A Survey on different Port Scanning Methods and the Tools used to perform the...
 
Module 3 Scanning
Module 3   ScanningModule 3   Scanning
Module 3 Scanning
 
Scanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptxScanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptx
 
Ceh v5 module 03 scanning
Ceh v5 module 03 scanningCeh v5 module 03 scanning
Ceh v5 module 03 scanning
 
Port Scanning Overview
Port Scanning  OverviewPort Scanning  Overview
Port Scanning Overview
 
Contents namp
Contents nampContents namp
Contents namp
 
Contents namp
Contents nampContents namp
Contents namp
 
For your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and laFor your final step, you will synthesize the previous steps and la
For your final step, you will synthesize the previous steps and la
 
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 FinalExploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
 
01204427-scanner.ppt
01204427-scanner.ppt01204427-scanner.ppt
01204427-scanner.ppt
 
Port Scanning
Port ScanningPort Scanning
Port Scanning
 
Modul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.pptModul 2 - Footprinting Scanning Enumeration.ppt
Modul 2 - Footprinting Scanning Enumeration.ppt
 
modul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdfmodul2-footprintingscanningenumeration.pdf
modul2-footprintingscanningenumeration.pdf
 
Scanning.pptx
Scanning.pptxScanning.pptx
Scanning.pptx
 
Network Security Nmap N Nessus
Network Security Nmap N NessusNetwork Security Nmap N Nessus
Network Security Nmap N Nessus
 
A REVIEW ON NMAP AND ITS FEATURES
A REVIEW ON NMAP AND ITS FEATURESA REVIEW ON NMAP AND ITS FEATURES
A REVIEW ON NMAP AND ITS FEATURES
 
6005679.ppt
6005679.ppt6005679.ppt
6005679.ppt
 
Firewall
FirewallFirewall
Firewall
 
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
 
Packet capturing
Packet capturingPacket capturing
Packet capturing
 

Recently uploaded

AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
symbo111
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Basic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparelBasic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparel
top1002
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
veerababupersonal22
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 

Recently uploaded (20)

AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Basic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparelBasic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparel
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 

Scanning

  • 1. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE ETHICAL HACKING
  • 2. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE SCANNING  Scanning is the process of finding open/close ports, vulnerabilities in remote system, server & networks. It will reveal IP addresses, Operating systems, Services running on remote computer. Three types of scanning. 1. Port Scanning 2. Network Scanning 3. Vulnerability Scanning
  • 3. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE SCANNING Port Scanning: is one of the most popular technique attacker uses to discover the service they break into. is one of the most popular technique attacker uses to discover the service they break into. It is one of the most popular technique attacker uses to discover the service they break into.  every machine connected to a LAN or connected to Internet via a modem run many services that listen at well-known and not so well-known ports.  There are 1 to 65535 ports are available in the computer.  By port scanning the attacker finds which ports are available.
  • 4. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE SCANNING Ports: The port numbers are unique only within a computer system.  Port numbers are 16-bit unsigned numbers.  The port numbers are divided into three ranges: 1. Well Known Ports (0..1023), 2. The Registered Ports (1024..49151), 3. The Dynamic and/or Private Ports (49152..65535).
  • 5. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE SCANNING Well Known Ports:  echo 7/tcp Echo  ftp-data 20/udp File Transfer [Default Data]  ftp 21/tcp File Transfer [Control]  ssh 22/tcp SSH Remote Login Protocol  telnet 23/tcp Telnet  domain 53/udp Domain Name Server  www-http 80/tcp World Wide Web HTTP.  Smtp 25/tcp Simple mail transfer protocol  Whois 43/tcp Whois server
  • 6. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE SCANNING Regestered Ports:  wins 1512/tcp Microsoft Windows Internet Name Service  radius 1812/udp RADIUS authentication protocol  yahoo 5010 Yahoo! Messenger  x11 6000-6063/tcp X Window System
  • 7. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE SCANNING  SYN - Synchronize - it is used to initiate connection between hosts.  ACK - Acknowledgement - It is used to establish connection between hosts.  PSH - push - tells receiving system to send all buffer data.  URG - urgent - stats that data contain in packet should be process immediately.  FIN - finish - tells remote system that there will be no more transmission.  TTL - Time to Live.
  • 8. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE SCANNING Open Scan: Known as TCP Scan and normally used to program sockets, this technique is the oldest and works making a full connection with the server. For that it makes an authentication with 3 packets. Is known as three-way- handshake: For the ports opened: Client ----> SYN ----> <---- SYN/ACK <---- Server Client ----> ACK ---->
  • 9. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE SCANNING For the ports closed: Client ----> SYN ----> <---- RST <---- Server Advantages : very easy to program.  Disadvantages: is very easy to detect and make logs on each connection. TCPConnect()  The connect() system call provided by an OS is used to open a connection to every interesting port on the machine.  If the port is listening, connect() will succeed, otherwise the port isn't reachable .
  • 10. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE SCANNING Stealth Scan:  A stealth scan is a kind of scan that is designed to go undetected by auditing tools.  Fragmented Scan: The scanner splits the TCP header into several IP fragments.  This bypasses some packet filter firewalls because they cannot see a complete TCP  header that can match their filter rules.
  • 11. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE SCANNING SYN Scan:  This technique is called half open scanning because a TCP connection is not completed.  A SYN packet is sent to remote computer.  The target host responds with a SYN+ACK, this indicates the port is listening and an RST indicates a non- listener.
  • 12. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE SCANNING FIN Scan:  Another technique sends erroneous packets at a port, expecting that open listening ports will send back different error messages than closed ports.  Closed ports reply to fin packets with RST.  Open ports ignore packets.
  • 13. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE SCANNING XMAS Scan:  XMAS uses scans where all flags in the TCP packet are set & sent to target host.  Closed ports reply to packets with RST.  Open ports ignore packets. NULL Scan:  Null Scan used no flags of TCP header & it sent to the target host.  Closed ports reply to packets with RST.  Open ports ignore packets.
  • 14. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE SCANNING Port Scanner: NMAP:
  • 15. DEPARTMENT OF INFORMATION TECHNOLOGY, SRKR ENGINEERING COLLEGE SCANNING  Nmap is powerful utility to scan large number of tools.  Provided with GUI as well as Command line interface.  It is supported by many operating systems.  It can carry out SYN Scan, FIN Scan, Stealth Scan, Half open scan & many other types.