You are on page 1of 61

Scanning Networks

Module
Objectives
Module Flow
Overview of
Network
Scanning
TCP
Communication
Flags
TCP Session
Establishment
Creating
Costum Packet
Using TCP
Flags
Scanning in
IPv6 Networks
Module Flow
Scanning Tool:
Nmap
Scanning Tool:
Hping2/ Hping3
Hping
Commands
Scanning Tools
Scanning Tools
for Mobile
Module Flow
Scanning
Techniques
ICMP Scanning

Checking for
Live Systems
Ping Sweep
Checkuing for
Live Systems
Ping Sweep
Tools
ICMP Echo
Scanning
TCP Connect/
Full Open Scan
Stealth Scan
(Half-open
Scan)
Inverse TCP
Flag Scanning
Xmas Scan
ACK Flag
Probe
Scanning
ACK Flag
Probe
Scanning
(Cont’d)
IDLE/IPID
Header Scan
UDP Scanning
SSDP and List
Scanning
Port Scanning
Countermeasures
Module Flow
IDS/Firewall
Evasion
Techniques
Packet
Fragmentation
Source
Routing
IP Address
Decoy
IP Address
Spoofing
IP Spoofing
Detection
Techniques:
Direct TTL
Probes
IP Spoofing
Detection
Techniques: IP
Identification
Number
IP Spoofing
Detection
Techniques:
TCP Flow
Control
Method
IP Spoofing
Countermeasu
res
Proxy Servers
Proxy Chaining
Proxy Tools:
Proxy Switcher
and Proxy
Workbench
Proxy Tools
Proxy Tools for
Mobile
Anonymozers
Censorship
Circumvention
Tools: Alkasir
and Tails
Anonymizers
Anonymizers
for Mobile
Module Flow
Banner
Grabbing
How to
Identify Target
System OS
Banner Grabbing
Countermeasures
Module Flow
Drawing
Network
Diagrams
Network
Discovery and
Mapping Tools
Network
Discovery
Tools for
Mobile
Module Flow
Scanning Pen
Testing
Scanning Pen
Testing
(cont’d)
Module
Summary

You might also like