Friday, 21 August 2020

CEH: Identifying Services & Scanning Ports | Gathering Network And Host Information | NMAP


CEH scanning methodology is the important step i.e. scanning for open ports over a network. Port is the technique used to scan for open ports. This methodology performed for the observation of the open and close ports running on the targeted machine. Port scanning gathered a valuable information about  the host and the weakness of the system more than ping sweep.

Network Mapping (NMAP)

Basically NMAP stands for Network Mapping. A free open source tool used for scanning ports, service detection, operating system detection and IP address detection of the targeted machine. Moreover, it performs a quick and efficient scanning a large number of machines in a single session to gathered information about ports and system connected to the network. It can be used over UNIX, LINUX and Windows.

There are some terminologies which we should understand directly whenever we heard like Open ports, Filtered ports and Unfiltered ports.

Open Ports means the target machine accepts incoming request on that port cause these ports are used to accept packets due to the configuration of TCP and UDP.

Filtered ports means the ports are usually opened but due to firewall or network filtering the nmap doesn't detect the open ports.

Unfiltered means the nmap is unable to determine whether the port is open or filtered  while the port is accessible.

Types Of NMAP Scan


Scan TypeDescription
Null Scan This scan is performed by both an ethical hackers and black hat hackers. This scan is used to identify the TCP port whether it is open or closed. Moreover, it only works over UNIX  based systems.
TCP connectThe attacker makes a full TCP connection to the target system. There's an opportunity to connect the specifically port which you want to connect with. SYN/ACK signal observed for open ports while RST/ACK signal observed for closed ports.
ACK scanDiscovering the state of firewall with the help ACK scan whether it is stateful or stateless. This scan is typically used for the detection of filtered ports if ports are filtered. Moreover, it only works over the UNIX based systems.
Windows scanThis type of scan is similar to the ACK scan but there is ability to detect an open ports as well filtered ports.
SYN stealth scanThis malicious attack is mostly performed by attacker to detect the communication ports without making full connection to the network.
This is also known as half-open scanning. 

 

All NMAP Commands 


CommandsScan Performed
-sTTCP connect scan
-sSSYN scan
-sFFIN scan
-sXXMAS tree scan
-sNNull scan
-sPPing scan
-sUUDP scan
-sOProtocol scan
-sAACK scan
-sWWindow scan
-sRRPC scan
-sLList/DNS scan
-sIIdle scan
-PoDon't ping
-PTTCP ping
-PSSYN ping
-PIICMP ping
-PBICMP and TCP ping
-PBICMP timestamp
-PMICMP netmask
-oNNormal output
-oXXML output
-oGGreppable output
-oAAll output
-T ParanoidSerial scan; 300 sec between scans
-T SneakySerial scan; 15 sec between scans
-T PoliteSerial scan; .4 sec between scans
-T NormalParallel scan
-T AggressiveParallel scan, 300 sec timeout, and 1.25 sec/probe
-T InsaneParallel scan, 75 sec timeout, and .3 sec/probe

 

How to Scan

You can perform nmap scanning over the windows command prompt followed by the syntax below. For example, If you wanna scan the host with the IP address 192.168.2.1 using a TCP connect scan type, enter this command:

nmap 192.168.2.1 –sT

nmap -sT 192.168.2.1

Related links


  1. Hack Tools
  2. Pentest Tools For Ubuntu
  3. Hacking Tools Online
  4. Pentest Tools Website
  5. Hack Tool Apk
  6. Hack Tools 2019
  7. Hackers Toolbox
  8. How To Install Pentest Tools In Ubuntu
  9. Hacker Tools
  10. Tools Used For Hacking
  11. Hacking Tools For Games
  12. Tools For Hacker
  13. Hack Tools
  14. Easy Hack Tools
  15. Hacker Tools Mac
  16. Hacks And Tools
  17. Pentest Tools Website Vulnerability
  18. Hacker Tools Mac
  19. What Are Hacking Tools
  20. What Are Hacking Tools
  21. Pentest Tools Windows
  22. Pentest Tools For Mac
  23. Hacker Techniques Tools And Incident Handling
  24. Pentest Tools Url Fuzzer
  25. Hacking Tools Windows
  26. Hack Tool Apk
  27. Pentest Reporting Tools
  28. Hacker Tools Github
  29. World No 1 Hacker Software
  30. Hacker
  31. Hacker Techniques Tools And Incident Handling
  32. Pentest Tools Website Vulnerability
  33. Hacking Tools Pc
  34. Pentest Tools Tcp Port Scanner
  35. Hacking Tools Windows 10
  36. Pentest Tools Open Source
  37. Hacking Tools And Software
  38. Hacker Tools Online
  39. Pentest Tools Android
  40. Hacking Tools Hardware
  41. Pentest Tools Linux
  42. Pentest Tools Subdomain
  43. Hack Apps
  44. Hack Tools Mac
  45. Hack Apps
  46. Hacker Tools For Mac
  47. Tools Used For Hacking
  48. Pentest Tools Bluekeep
  49. Pentest Tools Bluekeep
  50. Hacker Tools Hardware
  51. Hacking Tools Kit
  52. Hacker Tools Linux
  53. Hacking Tools For Pc
  54. Hacking Tools
  55. Usb Pentest Tools
  56. Hackers Toolbox
  57. Hack Tools For Windows
  58. Ethical Hacker Tools
  59. Best Pentesting Tools 2018
  60. Pentest Tools Kali Linux
  61. Top Pentest Tools
  62. Pentest Tools Apk
  63. Best Hacking Tools 2020
  64. Hack Tool Apk
  65. Physical Pentest Tools
  66. Hack Tools Github
  67. Nsa Hack Tools
  68. Hacking Tools 2019
  69. Hack Tools For Windows
  70. Hack Apps
  71. Pentest Recon Tools
  72. Hack Tools For Games
  73. Hack Tool Apk
  74. Hack Tool Apk No Root
  75. Hacker Tools For Windows
  76. Hack Tools Github
  77. Beginner Hacker Tools
  78. Underground Hacker Sites
  79. Hacking Tools For Windows 7
  80. Underground Hacker Sites
  81. Hacking Tools Software
  82. Hacker Tool Kit
  83. Pentest Tools Review
  84. Hacking Tools 2019
  85. Physical Pentest Tools
  86. Pentest Automation Tools
  87. Easy Hack Tools
  88. Pentest Tools For Mac
  89. Pentest Automation Tools
  90. Hacker Tool Kit
  91. Hacking Tools For Pc
  92. Nsa Hack Tools Download
  93. Install Pentest Tools Ubuntu
  94. Hack Apps
  95. How To Install Pentest Tools In Ubuntu
  96. Hack Tools For Windows
  97. Wifi Hacker Tools For Windows
  98. Pentest Tools List
  99. Free Pentest Tools For Windows
  100. New Hack Tools
  101. Hacker Tools For Mac
  102. Best Pentesting Tools 2018
  103. New Hack Tools
  104. Hacker Tools
  105. Termux Hacking Tools 2019
  106. Pentest Tools For Windows
  107. Hacker Tools For Mac
  108. Github Hacking Tools
  109. Hacker
  110. Pentest Tools Port Scanner
  111. Hacking Tools Usb
  112. Hack Tools
  113. Nsa Hack Tools Download
  114. Beginner Hacker Tools
  115. Pentest Tools Nmap
  116. Hacking Tools Download
  117. Wifi Hacker Tools For Windows
  118. Pentest Tools Online
  119. Hacking Tools Github
  120. New Hacker Tools
  121. Hacking Tools Download
  122. Hacker Search Tools
  123. Hacking Tools Windows 10
  124. Pentest Tools Apk
  125. Hack Rom Tools
  126. Bluetooth Hacking Tools Kali
  127. Pentest Tools Free
  128. Pentest Box Tools Download
  129. Pentest Tools Free
  130. Hacking Tools And Software
  131. Hacker Tools For Mac
  132. Hacking Apps
  133. Pentest Tools For Ubuntu
  134. Hacking Tools For Windows Free Download
  135. Pentest Tools Kali Linux
  136. Hacker Tools
  137. Game Hacking
  138. Wifi Hacker Tools For Windows
  139. Pentest Tools Android
  140. Hacker Tools Windows
  141. Hacker Tools List
  142. Install Pentest Tools Ubuntu
  143. Hack Tools
  144. Black Hat Hacker Tools
  145. Hacking Tools Usb
  146. Tools 4 Hack
  147. Hacking Tools For Pc
  148. Nsa Hack Tools
  149. Tools 4 Hack
  150. Hacker Tools Software
  151. Pentest Tools
  152. Pentest Tools Review
  153. Pentest Tools Download

No comments:

Post a Comment