Introduction to NSA
Advance Network Scanning
Introduction to Metasploit Framework
Search and Add Exploit
————————————–
NSA –> Network Security Analysis
5 phases of hacking in NMAP
1. Information Gathering
2. Scanning
3. Gaining Access
4. Maintaining Access
5. Covering Traces
Information Gathering
1. Target Specific
2. Network Specific
Network Specific Information Gathering
======================================
IP Address
Socets
Ports
MAC Address
…..
…..
1. Normal Information Gathering
2. Advanced | Intelligent Information Gathering
1. Normal Information Gathering
——————————-
Number of Devices Connected
IP Address Allocated
MAC Address
Vendor Name
Tools for scanning
arp-scan
#arp-scan –local
netdiscover
#netdiscover -r 192.168.0.1/24 -i wlan0
2. Advanced | Intelligent Information Gathering
In this type of information gathering, we will get very minute and granular information about the target in the network.
IP Address
MAC Address
Ports
Services
Version
Vendor
Operating System
Operating System Version
Operating System Family
Protocol
Tools
=====
nmap
zenmap
NMAP –> Network Mapper
=======================
Network exporation and discovery tool, which helps us in gathering the informartion about a network and a target website too. It was designed to scan the large networks but it also works perfectly fine for smaller networks.
It is CLI (command line interface) based tool
Types of Scan
=============
1. Network Specific Scan
#nmap 192.168.0.1-255
#nmap 192.168.0.1/24
STATE –> 1. OPEN
2. CLOSED
3. FILTERED
FILTERED|OPEN
FILTERED|CLOSED
2. Target Specific scan
#nmap <IP Address Of The Target>
3. Agressive Scan
#nmap -A -T4 <IP Address Of The Target>
A –> Agressive Scan
T –> Time Duration between sending 2 consecutive packet
4 –> 4 unit of time(sec)
4. Service Detection Scan
#nmap -sS 192.168.0.189
s –> Script
S –> Service Detection
5. Version Detection Scan
#nmap -sV <IP Address>
6. Minute Details
#nmap -sC <IP Address>
7. Combined Scan
#nmap -sS -sC -sV <IP Address>
8. Port Specific Scan
#nmap 192.168.0.181 -p80,3306
#nmap 192.168.0.181 -p80-3306
9. Firewall Scan
#nmap -f <IP Address>
#nmap <IP Address> -Pn
#nmap <IP Address> -Pn -p80,3306
#nmap –script firewall-bypass <target>
10. Vulnerability Scan
#nmap –script vuln 192.168.0.101
11. Operating System Detection Scan
#nmap 192.168.0.101 -O
12. To scan a website
#nmap <website domain name>
ZENMAP —> Twin Brother of NMAP, but it is GUI Based.
Flags
=====
1. ACK –> Acknowledgement
2. SYN –> Synchronization
3. FIN –> Finish
4. RST –> Reset
5. PSH –> Push
6. URG –> Urgent
Follow Us On Cyber Point Solution Youtube Channel : Click Here
Follow Us on Social Platforms to get Updated : twiter, facebook, Google Plus
Learn More Ethical Hacking and Cyber Security click on this link. cyber security