Header Ads Widget

Scanning Networks And Web Application | Pulkit py

Scanning Networks


  • Scanning Networks Is the basic step of Certified Ethical Hacking.
  •  Scanning is the necessary step of the Certified Ethical Hacking.
  • The Scanning Networks is used to Scan the Data of the website, Company, Any social account.  
  • Scanning is used to collect information such as Domain name, IP address, etc.

TCP Communication Flags

  1. URG(Urgent):- Data Contained in the packet should be processed  immediately
  2. FIN(Finish):- There will Be No more transmission
  3. RST(Reset):-Resets a connection
  4. PSH(Puch):-Sends all buffered data immediately
  5. ACK(Acknowledgement):-Acknowledgement the receipt of a packet
  6. SYN(synchronize):-Initiates A connection Between Hosts

Scanning Pen Testing


Step 1:- Perform Host Discovery! Use Nmap, Angry IP Scanner
Step 2:- Perform Host scanning! Use Nmap, Netscan Tools Prots
Step 3:- Perform Banner Grabbing/OS Fingerprinting! Use Telnet, Netcraft, ID Serve, etc
Step 4:- Scan For Vulnerability! Use Nessus, Saint, LAN Guard
Step 5:- Draw Network Diagram! Use Network Mapper
Step 6:- Prepare Proxies! USe PRoxy WorkBench
Step 7:- Document All the Finding

Still having the program contact me on  Instagram or comment below 

Copy with Credits

@☠🔰Pulkit Saini🔰☠

☠💀Nothing is Impossible in front of me💀☠

❤️ Owner Made with ❤️ by Pulkit Saini
For Your Support:-
Subscribe to my YouTube Channel:- https://www.youtube.com/pulkitpy
Follow me on Instagram:-https://www.instagram.com/pulkit_py/
Follow us on Facebook:- https://www.facebook.com/pulkitpy
Follow us on Github:- https://github.com/Pulkit-Py
Join Us on Telegram:-  https://t.me/pulkit_py

Post a Comment

0 Comments