SlideShare a Scribd company logo
1 of 10
SCANNING
FIRST STEP OF HACKING
2
• Scanning a network is the first real active
action taken by an attacker everything before
this has typically been passive or non-
intrusive.
• Scanning is the act to sending network traffic
to a host or network to elicit responses from
them the goal is to get responses back that tell
details about the network.
3
• Goal of Scanning include determining live
hosts, ports, protocols, service and os and
application version this information is used
to further determine vulnerability and
possible avenues of attack
• Scanning can be performed over any
network connection
4
• Targets are network devices and hosts-goal is
to gather port, protocol, services, banner
information to determine possible
vulnerability.
• Several different types of scans can be used
depends on goals, operating system, etc
typically not limited to one method of
scanning.
5
• Several tools available for scanning most work
similarly and offer varying features Some are
“all-in-one” types of tools
• Additional goal is avoid detection by IDS
• Use of ip spoofing, proxies, etc. to assist in
stealth scanning and detection avoidance
6
To identify live hosts on a network
To identify open & closed ports
To identify operating system information
To identify services running on a network
To identify running processes on a
network
To identify the presence of Security
Devices like firewalls
To identify System architecture
To identify running services
To identify vulnerabilities
TCP COMMUNICATION
There are two types of Internet Protocol (IP) traffic.
They are TCP(Transmission Control Protocol) and
UDP (User Datagram Protocol). TCP isconnection
oriented. Bidirectional communication takes place
after successfulconnection establishment. UDP is a
simpler, connectionless Internet protocol.Multiple
messages are sent as packets in chunks using UDP.
Unlike the TCP,UDP adds no reliability, flow-
control, or error-recovery functions to IPpackets.
Because of UDP’s simplicity, UDP headers contain
fewer bytes andconsume less network overhead
than TCP. Following diagram shows the TCP header
7
FLAG FILED IN THE TCP HEADER IS OF 9 BITS.
WHICH INCLUDES THE FOLLOWING 6 TCP
FLAGS: -
• SYN:- Initiates a connection between two hosts to facilitate
communication.
• ACK:- Acknowledge the receipt of a packet.
• URG:- Indicates that the data contained in the packet is urgent and
should process immediately.
• PSH:- Instructs the sending system to send all buffered data immediately.
• FIN:- Tells the remote system about the end of the communication. In
essence, this gracefully closes a connection.
• RST:- Reset a connection.
8
THREE-WAY
HANDSHAKING
• There is three-way
handshaking while establishing
a TCP connection between
hosts. This handshaking
ensures successful, reliable and
connection oriented session
between these hosts. The
process of establishment of a
TCP connection includes three
steps. As shown in the figure
9
TCP/IP
10
Consider Host P wants to communicate with Host Q. TCP Connection
establishes when host P sends a Sync packet to host Q. Host Q upon
receipt of Sync packet from Host P, reply to Host P with Sync+Ack
packet. Host P reply with Ack packet when it receives Sync+Ack
packet from host Q. After successful handshaking results in the
establishment of TCP connection.

More Related Content

Similar to Scanning.pptx

CISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalCISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalKarthikeyan Dhayalan
 
Chapter 12
Chapter 12Chapter 12
Chapter 12cclay3
 
Dist sniffing & scanning project
Dist sniffing & scanning projectDist sniffing & scanning project
Dist sniffing & scanning projectRishu Seth
 
IPS NAT and VPN.pptx
IPS NAT and VPN.pptxIPS NAT and VPN.pptx
IPS NAT and VPN.pptxkarthikvcyber
 
topicCybersecurity_4
topicCybersecurity_4topicCybersecurity_4
topicCybersecurity_4Anne Starr
 
98 366 mva slides lesson 8
98 366 mva slides lesson 898 366 mva slides lesson 8
98 366 mva slides lesson 8suddenven
 
Network security
Network securityNetwork security
Network securityNandini Raj
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewallCoder Tech
 
Monitoramento transmissao hacje2014 03-07 00-50-27-_8.1
Monitoramento transmissao hacje2014 03-07 00-50-27-_8.1Monitoramento transmissao hacje2014 03-07 00-50-27-_8.1
Monitoramento transmissao hacje2014 03-07 00-50-27-_8.1Suemi Iarussi
 
gkk_2021123rg5hSecurity essentials domain 2
gkk_2021123rg5hSecurity essentials   domain 2gkk_2021123rg5hSecurity essentials   domain 2
gkk_2021123rg5hSecurity essentials domain 2Anne Starr
 
gkkSecurity essentials domain 2
gkkSecurity essentials   domain 2gkkSecurity essentials   domain 2
gkkSecurity essentials domain 2Anne Starr
 
gkk20211e4djwew4dSecurity essentials domain 2
gkk20211e4djwew4dSecurity essentials   domain 2gkk20211e4djwew4dSecurity essentials   domain 2
gkk20211e4djwew4dSecurity essentials domain 2Anne Starr
 
Node finder presentation
Node finder presentationNode finder presentation
Node finder presentationVarun Varshney
 

Similar to Scanning.pptx (20)

Network scan
Network scanNetwork scan
Network scan
 
CISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network FundamentalCISSP - Chapter 4 - Network Fundamental
CISSP - Chapter 4 - Network Fundamental
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Dist sniffing & scanning project
Dist sniffing & scanning projectDist sniffing & scanning project
Dist sniffing & scanning project
 
IPS NAT and VPN.pptx
IPS NAT and VPN.pptxIPS NAT and VPN.pptx
IPS NAT and VPN.pptx
 
topicCybersecurity_4
topicCybersecurity_4topicCybersecurity_4
topicCybersecurity_4
 
MVA slides lesson 8
MVA slides lesson 8MVA slides lesson 8
MVA slides lesson 8
 
98 366 mva slides lesson 8
98 366 mva slides lesson 898 366 mva slides lesson 8
98 366 mva slides lesson 8
 
Network security
Network securityNetwork security
Network security
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Monitoramento transmissao hacje2014 03-07 00-50-27-_8.1
Monitoramento transmissao hacje2014 03-07 00-50-27-_8.1Monitoramento transmissao hacje2014 03-07 00-50-27-_8.1
Monitoramento transmissao hacje2014 03-07 00-50-27-_8.1
 
Network Protocol and TCP/IP
Network Protocol and TCP/IPNetwork Protocol and TCP/IP
Network Protocol and TCP/IP
 
gkk_2021123rg5hSecurity essentials domain 2
gkk_2021123rg5hSecurity essentials   domain 2gkk_2021123rg5hSecurity essentials   domain 2
gkk_2021123rg5hSecurity essentials domain 2
 
gkkSecurity essentials domain 2
gkkSecurity essentials   domain 2gkkSecurity essentials   domain 2
gkkSecurity essentials domain 2
 
gkk20211e4djwew4dSecurity essentials domain 2
gkk20211e4djwew4dSecurity essentials   domain 2gkk20211e4djwew4dSecurity essentials   domain 2
gkk20211e4djwew4dSecurity essentials domain 2
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocols
 
Node finder presentation
Node finder presentationNode finder presentation
Node finder presentation
 
Scanning
ScanningScanning
Scanning
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
Linux and firewall
Linux and firewallLinux and firewall
Linux and firewall
 

Recently uploaded

Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 

Recently uploaded (20)

Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 

Scanning.pptx

  • 2. 2 • Scanning a network is the first real active action taken by an attacker everything before this has typically been passive or non- intrusive. • Scanning is the act to sending network traffic to a host or network to elicit responses from them the goal is to get responses back that tell details about the network.
  • 3. 3 • Goal of Scanning include determining live hosts, ports, protocols, service and os and application version this information is used to further determine vulnerability and possible avenues of attack • Scanning can be performed over any network connection
  • 4. 4 • Targets are network devices and hosts-goal is to gather port, protocol, services, banner information to determine possible vulnerability. • Several different types of scans can be used depends on goals, operating system, etc typically not limited to one method of scanning.
  • 5. 5 • Several tools available for scanning most work similarly and offer varying features Some are “all-in-one” types of tools • Additional goal is avoid detection by IDS • Use of ip spoofing, proxies, etc. to assist in stealth scanning and detection avoidance
  • 6. 6 To identify live hosts on a network To identify open & closed ports To identify operating system information To identify services running on a network To identify running processes on a network To identify the presence of Security Devices like firewalls To identify System architecture To identify running services To identify vulnerabilities
  • 7. TCP COMMUNICATION There are two types of Internet Protocol (IP) traffic. They are TCP(Transmission Control Protocol) and UDP (User Datagram Protocol). TCP isconnection oriented. Bidirectional communication takes place after successfulconnection establishment. UDP is a simpler, connectionless Internet protocol.Multiple messages are sent as packets in chunks using UDP. Unlike the TCP,UDP adds no reliability, flow- control, or error-recovery functions to IPpackets. Because of UDP’s simplicity, UDP headers contain fewer bytes andconsume less network overhead than TCP. Following diagram shows the TCP header 7
  • 8. FLAG FILED IN THE TCP HEADER IS OF 9 BITS. WHICH INCLUDES THE FOLLOWING 6 TCP FLAGS: - • SYN:- Initiates a connection between two hosts to facilitate communication. • ACK:- Acknowledge the receipt of a packet. • URG:- Indicates that the data contained in the packet is urgent and should process immediately. • PSH:- Instructs the sending system to send all buffered data immediately. • FIN:- Tells the remote system about the end of the communication. In essence, this gracefully closes a connection. • RST:- Reset a connection. 8
  • 9. THREE-WAY HANDSHAKING • There is three-way handshaking while establishing a TCP connection between hosts. This handshaking ensures successful, reliable and connection oriented session between these hosts. The process of establishment of a TCP connection includes three steps. As shown in the figure 9
  • 10. TCP/IP 10 Consider Host P wants to communicate with Host Q. TCP Connection establishes when host P sends a Sync packet to host Q. Host Q upon receipt of Sync packet from Host P, reply to Host P with Sync+Ack packet. Host P reply with Ack packet when it receives Sync+Ack packet from host Q. After successful handshaking results in the establishment of TCP connection.