Skip to main content

NMAP Basics

Nmap is a free open source software available for both Linux and Windows. Basically its a port scanning software.


Basic Scan Types
The two basic scan types used in nmap are TCP connect() scanning [-sT] and SYN scanning (also known as half-open,or stealth) [-sS].

TCP Connect() scanning [-sT]
These scans are named as connect() scanning because UNIX has a system call named connect() to start any TCP connection to a remote machine.If the connection succeeds to a particular port of remote machine i.e it connects , then that port is listed OPEN for that remote machine, if connection fails , then remote machine showed either offline or port is closed. It runs simple process of scannig all the ports of the remote machine and lists which posts are open and which are closed.

This is an easy way and gives a clear picture of the process but it has disadvantage too ,if the reomte machine is having advanced firewalls and intrusion detection systems, it will flag a warning that all ports are scanning, even modern servers log all the information of the TCP connection that is made to it. So it stores source ip aaddress from which scanning is made.
Thus this method has major drawback thats why stealth scanning is developed.\





next article on syn stealth scan..

Comments

Popular posts from this blog

Database Sharding

Collating some of the resources which talks about Database Sharding. https://en.wikipedia.org/wiki/Shard_(database_architecture) [Feb 2019]  http://highscalability.com/blog/2019/2/19/intro-to-redis-cluster-sharding-advantages-limitations-deplo.html Redis Cluster is the Native Sharding implementation available within Redis that allows your to automatically distribute your data across multiple nodes without having to rely on external tools and utilities. Its covers Sharding with Redis Cluster  where Redis Clusters is divided in 16384 slots and these slots are assigned to multiple Redis Nodes. The  Redis Cluster Specification  is the definitive guide to understanding the internals of the technology, while the  Redis Cluster Tutorial  provides deployment and administration guidelines. [ Jan 2019  ]  https://scalegrid.io/blog/scalegrid-hosting-adds-support-for-highly-available-redis-clusters-with-automated-sharding/ ScaleGrid : Fully Manage...

Penetration Testing Basics

Penetration testing, often called “pentesting”,“pen testing”, or “security testing”, is the practice of attacking your own or your clients’ IT systems in the same way a hacker would to identify security holes. Of course, you do this without actually harming the network. The person carrying out a penetration test is called a penetration tester or pentester. The difference between Penetration Testing and Hacking is that you have the system owner's permission to do testing and to identfiy security holes. If you want to do penetration testing u should better ask for his/her permission. Basic Security Concepts Vulnerability: It is a security hole in a piece of software, hardware of Operating system that provides a way to attack the system.A vulnerabilty is as simple as weak passwords and as complex as buffer overflows as well as SQL injection. Security Research: Vulnerabilities are typically searched by security researchers who finds the flaws in the system. Security Research can ...