Hacking Class 4 - Scanning and Attacking Open Ports

In my Previous class I have explained about footprinting i.e getting the IP of the Person/website/organisation whom you want to attack and extracting the personal Information.. You all were thinking that what was the use of that .. In this class you will came to know why we have undergo footprinting and analysis part...

In Scanning Part We Will Cover the Following Topics in details :

~ Definition of scanning
~ Types and objectives of Scanning
~ Understanding Scanning methodology
~ Checking live systems and open ports
~ Understanding scanning techniques
~ Different tools present to perform Scanning
~ Understanding banner grabbing and OS fingerprinting
~ Drawing network diagrams of vulnerable hosts
~ Preparing proxies
~ Understanding anonymizers
~ Scanning countermeasures

Hacking Class 4 - Scanning and Attacking Open Ports



What Is Scanning ?? And Why We Focus On that ?

 Scanning as from the name means that we will scan something to find some details etc etc... Scanning basically refers to the gathering of following four informations...

We Scan systems for four basic purposes :-

  • To find specific IP address
  • Operating system
  • System Architecture
  • Services Running on system


The various types of scanning are as follows:
~Port Scanning
~Network Scanning
~Vulnerability Scanning

I want to Define These Terms here Only as they are of great use in further tutorial...

PORT SCANNING : There are 64k ports in a computer out of which 1k are fixed for system or OS services. In Port scanning we scan for the open Ports which can be used to attack the victim computer.
In Port scanning a series of messages sent to break into a computer to learn about the computer’s network services. Through this we will know that which port we will use to attack the victim..

Network Scanning : Network scanning is basically a procedure of finding the active hosts on the Network.
i.e We tries to find that system is standalone or multiuser...

This is done either for the purpose of attacking them or for network security assessment i.e how secured the network Is ??

Vulnerability Scanning : As from the name , In this type of scanning We scan the systems for finding the vulnerability i.e the weakness in OS/database ... Once we find the vulnerability or loop hole we can utilize it to Best..and attack the victim through that ...

OBJECTIVES OF SCANNING 
These are Primary objectives of scanning i.e why do we do scanning :

~ To detect the live systems running on the network.
~ To discover which ports are active/running.
~ To discover the operating system running on the target system (fingerprinting).
~ To discover the services running on the target system.
~ To discover the IP address of the target system.


We will prefer TOOLS for this because they will reduce our Hectic Work... The first Tool that we Use is the NMAP :
DOWNLOAD :http://nmap.org/dist/nmap-5.00-setup.exe

Features of NMAP :

~ Nmap is used to carry out port scanning, OS detection, version detection, ping sweep, and many other techniques.
~ It scans a large number of machines at one time.
~ It is supported by many operating systems.
~ It can carry out all types of port scanning techniques.

Hacking Class 4 - Scanning and Attacking Open Ports


SECOND TOOL IS NET TOOLS 5.0.70 :

Itz is a collection of various Networking Tools ... must for beginners...
DOWNLOAD: http://www.softpedia.com/progDownload/Net-Tools-Download-22193.html


~ Net Tools Suite Pack is a collection of scanning tools.
~ This toolset contains tons of port scanners, flooders, web rippers, and mass e-mailers.
Note: Some of these tools may not Work but some are too good.

Hacking Class 4 - Scanning and Attacking Open Ports


Hacking Class 4 - Scanning and Attacking Open Ports


I thisnk that's Enough for Today .We will discuss more on scanning tomorrow Until You try these tools..
If you have any problem in Using these tools then you can ask me ..I will help you use these tools...

ENJOY AND HAVE FUN ! IF YOU HAVE ANY QUERIES ASK ME IN FORM OF COMMENTS !

19 comments:

  1. thanks ! I will try these tools..

    ReplyDelete
  2. Nettools is really a awesome package.. thanks bro.

    ReplyDelete
  3. Both tools are too goood...great info :))

    ReplyDelete
  4. Nmap is master software...lol it extracts all information :P :D

    ReplyDelete
  5. Thanx but u didn't reply my last question...

    ReplyDelete
  6. The question was..
    what are this ms ??? which line is for what... its lill different with mine.... many came as timeout or....

    &

    Last time i asked u what are the popups that was bursting and u said it was orkut prob... but now happens quite often and while opening other sites also... plz help!! Are u get boared if i ask u questions ..ha ha .. b'coz everything u want to teach, I want to learn better.. Thank U.

    ReplyDelete
  7. @Meghraj

    Someone has send you an Ebomb... Ebomb is a program which opens a number of windows of your web browser and make ur system Hang... Download Avira antivirus and spyware terminator and run a through scan....It will solve your Problem...

    ReplyDelete
  8. Thank U.. I'm using avg 8.5 internet security.. and spybot SD resident ..will it help me...???

    ReplyDelete
  9. yaa AVG is too good....and sufficient in itself..

    ReplyDelete
  10. Whats up Lokesh... no class.. yesterday???? waiting for the class...hmmm!!

    ReplyDelete
  11. Brother Today I am having my exam of Programming languages and anlysis .... am pity much busy in preparation..

    ReplyDelete
  12. ooooo Good Luck for the exam!!!!

    ReplyDelete
  13. hey bro,,,,,how 2 scan,,,,,help me out wid steps....plzz

    ReplyDelete
  14. Excellent informative article.Good luck for your exams!!

    ReplyDelete
  15. The question is; how to attack open ports?

    ReplyDelete
  16. hello sir
    how to make FULLY UNDETECTABLE TROJAN

    ReplyDelete
  17. hey after scanning how to check for vulnerability and den how to attack those ports,if u cud give a hint that will be of much help??

    ReplyDelete

Please do not spam.

Copyright © 2012 Learn How to Hack - Best Online Ethical Hacking Website All Right Reserved
Designed by Hackingloops.