reimerex · @reimerex
4 followers · 18 posts · Server infosec.exchange

[ ] Day 4

In Day 4 Tasks, we learn on how to do

Scanning is procedure to identify living hosts, ports, and services running on specify target.

There are 2 types of scan based on their intrusiveness:
1.
Passive scan is scanning without touching/interacting directly with the target device. The scan usually done being capturing packages using . However, the information you can get are fairly limited.

2.
Active scan is scanning that interacting directly with the target service, usually by sending pocket to specific asset. The scanning will immediately do a deep scan to get a lot of information from the target.

Several techniques:
1.
The scan that aimed to map the entire network of the target. When an attacker has mapped the entire network of their target, they can launch through the weakness of enemy network.

2.
The scan that aimed to look for any open port that capable of sending and retrieving request/data.

3.
The scan that aimed to identify what kind of existed on the network that may threaten the system.

Tools to do scanning:
1.
NMAP is one of the most popular tool used for scanning a network. It can be used to scan open ports, open , open , running , etc.

2.
Nikto is a open source that can be used to identify for . It allows to search a for their subdomains, outdated servers, messages, and many more.

#adventofcyber2022 #tryhackme #scanning #passivescan #wireshark #activescanning #networkscanning #exploit #portscanning #vulnerabilityscanning #vulnerability #nmap #networkprotocols #services #operatingsystem #nikto #website #debug

Last updated 2 years ago

ITSEC News · @itsecbot
687 followers · 32461 posts · Server schleuss.online