Register and join over 40,000 other developers!
Recent Topics
-
Print specific values from dictionary with a specific key name
Siten0308 - Jun 20 2019 01:43 PM
-
Learn algorithms and programming concepts
johnnylo - Apr 23 2019 07:49 AM
-
Job Gig PHP Form Needed
PJohnson - Apr 18 2019 03:55 AM
-
How to make code run differently depending on the platform it is running on?
xarzu - Apr 05 2019 09:17 AM
-
How do I set a breakpoint in an attached process in visual studio
xarzu - Apr 04 2019 11:47 AM
Recent Blog Entries
Recent Status Updates
Popular Tags
- networking
- Managed C++
- stream
- console
- database
- authentication
- Visual Basic 4 / 5 / 6
- session
- Connection
- asp.net
- import
- syntax
- hardware
- html5
- array
- mysql
- java
- php
- c++
- string
- C#
- html
- loop
- timer
- jquery
- ajax
- javascript
- programming
- android
- css
- assembly
- c
- form
- vb.net
- xml
- linked list
- login
- encryption
- pseudocode
- calculator
- sql
- python
- setup
- help
- game
- combobox
- binary
- hello world
- grid
- innerHTML

Cracking the System - Scanning
Started by Showstopper, Jul 13 2009 03:47 PM
6 replies to this topic
#1
Posted 13 July 2009 - 03:47 PM
This is the next part of the guide which will cover scanning.
Cracking the System - Scanning:
by Showstopper
The next thing to do when trying to gain access to a system is scanning. Note that when scanning you are touching the system and scans can easily be picked up by an IDS. Scanning in short gives a layout of the targets network.
As stated scanning is detected but most administrators ignore or dont even know what they are looking at.
The most used scanning tool is nmap, but there are many.
TCP connection:
When you scan your target using TCP communication, there are six TCP flags can be utilized during packet transmission. A flag will indicate whether the sent packets are syn, fin, urg, psh, ack or rst packets.
Lets talk about the most common TCP Scan types. There are full scan, half open scan, stealth scan, and ack scan.
full: Completes 3 way TCP. Gives accurate results, but picked up easily.
half open: If the remote replies back to you after you have sent syn request, this means the port is open.
stealth: Scan ports randomly and reduces the speed.
There are many others these are just some main ones.
Next is UDP & ICMP Scanning UDP and ICMP connections most of the times are blocked at the firewall level.
UDP works by sending the packet and forgetting it. Say we came across a port and its open then that port on the system will not reply back because UDP doesnt give you the delivery packets during communication. Since there was no reply then it is probably open.
That is the basics of scanning. If you have any questions on anything let me know and I will do my best to help you.
Cracking the System - Scanning:
by Showstopper
The next thing to do when trying to gain access to a system is scanning. Note that when scanning you are touching the system and scans can easily be picked up by an IDS. Scanning in short gives a layout of the targets network.
As stated scanning is detected but most administrators ignore or dont even know what they are looking at.
The most used scanning tool is nmap, but there are many.
TCP connection:
When you scan your target using TCP communication, there are six TCP flags can be utilized during packet transmission. A flag will indicate whether the sent packets are syn, fin, urg, psh, ack or rst packets.
Lets talk about the most common TCP Scan types. There are full scan, half open scan, stealth scan, and ack scan.
full: Completes 3 way TCP. Gives accurate results, but picked up easily.
half open: If the remote replies back to you after you have sent syn request, this means the port is open.
stealth: Scan ports randomly and reduces the speed.
There are many others these are just some main ones.
Next is UDP & ICMP Scanning UDP and ICMP connections most of the times are blocked at the firewall level.
UDP works by sending the packet and forgetting it. Say we came across a port and its open then that port on the system will not reply back because UDP doesnt give you the delivery packets during communication. Since there was no reply then it is probably open.
That is the basics of scanning. If you have any questions on anything let me know and I will do my best to help you.
#2
Guest_Jordan_*
Posted 13 July 2009 - 05:08 PM
Very informative, +rep! At CodeCall, if you scan the servers it will automatically ban your IP, forever. This means your TCP/UDP requests are dropped completely. Be careful who you scan if you care not to be blocked
#3
Posted 14 July 2009 - 11:06 AM
do you know a good tutorial that will discuss this topic in depth in c++.
the code is with you
#4
Posted 14 July 2009 - 12:04 PM
do you know a good tutorial that will discuss this topic in depth in c++.
Port scanning?
#5
Posted 14 July 2009 - 01:33 PM
So, once you've got all of the open ports, what next?
#6
Posted 14 July 2009 - 07:32 PM
So, once you've got all of the open ports, what next?
That is in the next tutorial which I have already submitted, just waiting for someone to accept it.
#7
Posted 21 July 2011 - 06:59 PM
Meh, turn off my router turn it back on. Ban FAILEDVery informative, +rep! At CodeCall, if you scan the servers it will automatically ban your IP, forever. This means your TCP/UDP requests are dropped completely. Be careful who you scan if you care not to be blocked
Please, write clearly with proper structure. Double spacing makes the text feel un-jointed, Capitalizing Every Word Means People Stop Before Every Word Sub-Consciously Which Is A Pain In The Backside, and use code tags! (The right most styling box).
Recommended from our users: Dynamic Network Monitoring from WhatsUp Gold from IPSwitch. Free Download