2. Port and Service Discovery
The next step after discovering active hosts in the target network is to scan for open ports and services running on the target IP addresses
1. Megaping (on windows)
2. NetscanToolsPro(on windows)
3. Sxtool (Linux)
scan the subnet
Let's assume that the actual ARP cache is in the arp.cache
file. We can create it manually or use ARP scan as shown below:
Once we have the ARP cache file, we can run scans of higher-level protocols like TCP SYN scan:
we can run udp scans as well.
if no response then port is opened, otherwise in case of error code port is closed
4. Explore Various Network Scanning Techniques using Nmap
-v Verbose scan lists all hosts and ports in the result
-sS stealth scan
-sU UDP scan
-sX xmass scan
-sM Maimon scan (FIN/ACK)
-sA Ack scan (no response it is filtered and RST means not filtered.
-sN Null scan
-T4 Aggressive
-A all advanced and aggressive scan
-sV Detects person
-sC script scanning
Use Zenmap and get used to it.
Nmap scripts
More scancs
IDLE/IPID Header Scan: A TCP port scan method that can be used to send a spoofed source address to a computer to discover what services are available.
# nmap -sI -v [target IP address]
SCTP INIT Scan: An INIT chunk is sent to the target host; an INIT+ACK chunk response implies that the port is open, and an ABORT Chunk response means that the port is closed.
# nmap -sY -v [target IP address]
SCTP COOKIE ECHO Scan: A COOKIE ECHO chunk is sent to the target host; no response implies that the port is open and ABORT Chunk response means that the port is closed.
# nmap -sZ -v [target IP address]
5. HPING
Ack scan no response means port is filtered. RST means closed
-c –count: packet count
–faster: alias for -i u1000 (100 packets for second)
–flood: sent packets as fast as possible. Don’t show replies.
-V –verbose: verbose mode
-0 –rawip: RAW IP mode
-1 –icmp: ICMP mode
-2 –udp: UDP mode
-8 –scan: SCAN mode.
-9 –listen: listen mode
-a –spoof: spoof source address
-C –icmptype: icmp type
-K –icmpcode: icmp code
-L –setack: set TCP ack
-F –fin: set FIN flag
-S –syn: set SYN flag
-R –rst: set RST flag
-A –ack: set ACK flag
-X –xmas: set X unused flag (0x40)
-Y –ymas: set Y unused flag (0x80)
Syn scan on a port.
Last updated