[ #AdventOfCyber2022 #tryhackme] Day 4
In Day 4 Tasks, we learn on how to do #scanning
Scanning is procedure to identify living hosts, ports, and services running on specify target.
There are 2 types of scan based on their intrusiveness:
1. #passivescan
Passive scan is scanning without touching/interacting directly with the target device. The scan usually done being capturing packages using #wireshark. However, the information you can get are fairly limited.
2. #activescanning
Active scan is scanning that interacting directly with the target service, usually by sending pocket to specific asset. The scanning will immediately do a deep scan to get a lot of information from the target.
Several #scanning techniques:
1. #networkscanning
The scan that aimed to map the entire network of the target. When an attacker has mapped the entire network of their target, they can launch #exploit through the weakness of enemy network.
2. #portscanning
The scan that aimed to look for any open port that capable of sending and retrieving request/data.
3. #vulnerabilityscanning
The scan that aimed to identify what kind of #vulnerability existed on the network that may threaten the system.
Tools to do scanning:
1. #nmap
NMAP is one of the most popular tool used for scanning a network. It can be used to scan open ports, open #networkprotocols , open #services, running #operatingsystem, etc.
2. #nikto
Nikto is a open source that can be used to identify #website for #vulnerability. It allows to search a #website for their subdomains, outdated servers, #debug messages, and many more.
#adventofcyber2022 #tryhackme #scanning #passivescan #wireshark #activescanning #networkscanning #exploit #portscanning #vulnerabilityscanning #vulnerability #nmap #networkprotocols #services #operatingsystem #nikto #website #debug
Cybercriminals Ramp Up Exploits Against Serious Zyxel Flaw - More than 100,000 Zyxel networking products could be vulnerable to a hardcoded credential vulnerab... https://threatpost.com/cybercriminals-exploits-zyxel-flaw/162789/ #networkingdevice #vulnerabilities #activescanning #cve-2020-29583 #routertakeover #activeexploit #cybercriminal #vulnerability #sshbackdoor #firewalls #exploit #hacks #zyfwp #zyxel #vpn
#vpn #Zyxel #zyfwp #hacks #exploit #firewalls #sshbackdoor #vulnerability #cybercriminal #activeexploit #routertakeover #cve #activescanning #vulnerabilities #networkingdevice