Scanning Networks
- Scanning Networks Is the basic step of Certified Ethical Hacking.
- Scanning is the necessary step of the Certified Ethical Hacking.
- The Scanning Networks is used to Scan the Data of the website, Company, Any social account.
- Scanning is used to collect information such as Domain name, IP address, etc.
TCP Communication Flags
- URG(Urgent):- Data Contained in the packet should be processed immediately
- FIN(Finish):- There will Be No more transmission
- RST(Reset):-Resets a connection
- PSH(Puch):-Sends all buffered data immediately
- ACK(Acknowledgement):-Acknowledgement the receipt of a packet
- SYN(synchronize):-Initiates A connection Between Hosts
Scanning Pen Testing
Step 1:- Perform Host Discovery! Use Nmap, Angry IP Scanner
Step 2:- Perform Host scanning! Use Nmap, Netscan Tools Prots
Step 3:- Perform Banner Grabbing/OS Fingerprinting! Use Telnet, Netcraft, ID Serve, etc
Step 4:- Scan For Vulnerability! Use Nessus, Saint, LAN Guard
Step 5:- Draw Network Diagram! Use Network Mapper
Step 6:- Prepare Proxies! USe PRoxy WorkBench
Step 7:- Document All the Finding
Still having the program contact me on Instagram or comment below
Copy with Credits
@☠🔰Pulkit Saini🔰☠
☠💀Nothing is Impossible in front of me💀☠
@☠🔰Pulkit Saini🔰☠
☠💀Nothing is Impossible in front of me💀☠
❤️ Owner Made with ❤️ by Pulkit Saini
For Your Support:-
Subscribe to my YouTube Channel:- https://www.youtube.com/pulkitpy
Follow me on Instagram:-https://www.instagram.com/pulkit_py/
Follow us on Facebook:- https://www.facebook.com/pulkitpy
Follow us on Github:- https://github.com/Pulkit-Py
Join Us on Telegram:- https://t.me/pulkit_py
0 Comments