Lisa Bock dives into the various scanning techniques and their objectives. Ping Sweeps to see what hosts are alive. Port Scanning to identify listening TCP and UDP ports. Network Mapping identifies the topology and creates a map. OS fingerprinting determines the target’s operating system. Use Wireshark to see a UDP scan.
- [Voiceover] Scanning techniques can vary.…But there are some common scans.…Each having a different objective.…A Ping Sweep, will send a series of package out…to identify live hosts on the network.…It waits for one to respond,…and then it knows which host are alive.…A port scan identifies TCP and UDP ports…on a live target system looking for services.…Network mapping, identifies the topology…and creates a map of the network.…
Operating system fingerprinting determines…the target's operating system based on response behavior.…Nmap is a commonly used tool that includes…a variety of scans to find live hosts…and listening services.…And it can also evade intrusion detection systems.…Nmap identifies the operating systems based…on specific behavior.…Such as TCP Windows size and the TCP header,…and time to live value in an IP header,…which differ according to the operating system.…
Because the RFC's for TCP…and IP don't specify default values.…Here are some common values for different operating systems.…For example, Windows XP has time to live value of 128.…
This course investigates the scanning tools and techniques used to obtain information from a target system, including specially crafted packets, TCP flags, UDP scans, and ping sweeps. Lisa Bock discusses how hackers can identify live systems via protocols, blueprint a network, and perform a vulnerability scan to find weaknesses. She also introduces some of the tools and techniques that hackers use to counter detection via evasion, concealment, and spoofing. In addition, learn how to reduce the threat of tunneling, a method hackers use to circumvent network security.
Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312_50) version 10.
- Scanning overview
- Port scanning countermeasures
- Scanning and querying DNS
- Scanning with ICMP
- Mapping (or blueprinting) a network
- Scanning for vulnerabilities
- Using tools such as hping and NetScan
- Evading detection
- Concealing your network traffic
- Preventing tunneling
Skill Level Intermediate
1. Scanning Overview and Methodology
2. Identifying Live Systems Using Protocols
3. Blueprint the Network
4. Vulnerability Scanning
Commercial and free scanners3m 17s
5. Scanning Tools
6. Evading Detection
7. Concealing and Spoofing
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.