[ #AdventOfCyber2022 #tryhackme] Day 4
In Day 4 Tasks, we learn on how to do #scanning
Scanning is procedure to identify living hosts, ports, and services running on specify target.
There are 2 types of scan based on their intrusiveness:
1. #passivescan
Passive scan is scanning without touching/interacting directly with the target device. The scan usually done being capturing packages using #wireshark. However, the information you can get are fairly limited.
2. #activescanning
Active scan is scanning that interacting directly with the target service, usually by sending pocket to specific asset. The scanning will immediately do a deep scan to get a lot of information from the target.
Several #scanning techniques:
1. #networkscanning
The scan that aimed to map the entire network of the target. When an attacker has mapped the entire network of their target, they can launch #exploit through the weakness of enemy network.
2. #portscanning
The scan that aimed to look for any open port that capable of sending and retrieving request/data.
3. #vulnerabilityscanning
The scan that aimed to identify what kind of #vulnerability existed on the network that may threaten the system.
Tools to do scanning:
1. #nmap
NMAP is one of the most popular tool used for scanning a network. It can be used to scan open ports, open #networkprotocols , open #services, running #operatingsystem, etc.
2. #nikto
Nikto is a open source that can be used to identify #website for #vulnerability. It allows to search a #website for their subdomains, outdated servers, #debug messages, and many more.
#adventofcyber2022 #tryhackme #scanning #passivescan #wireshark #activescanning #networkscanning #exploit #portscanning #vulnerabilityscanning #vulnerability #nmap #networkprotocols #services #operatingsystem #nikto #website #debug
RIP, Sally Floyd, whose work on Random Early Detection help keep the internet working despite experiencing congestion.
#Internet #Networking #NetworkProtocols #CongestionControl #Obituaries #Scientists
https://www.nytimes.com/2019/09/04/science/sally-floyd-dead.html
#internet #networking #networkprotocols #congestioncontrol #obituaries #scientists
12 File Transfer Protocols And The Businesses They're Best Suited For...
https://www.jscape.com/blog/12-file-transfer-protocols-businesses