enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Nmap - Wikipedia

    en.wikipedia.org/wiki/Nmap

    Nmap features include: Fast scan (nmap -F [target]) – Performing a basic port scan for fast result. Host discovery – Identifying hosts on a network. For example, listing the hosts that respond to TCP and/or ICMP requests or have a particular port open. Port scanning – Enumerating the open ports on target hosts.

  3. Banner grabbing - Wikipedia

    en.wikipedia.org/wiki/Banner_grabbing

    Tools commonly used to perform banner grabbing are Telnet, Nmap and Netcat. For example, one could establish a connection to a target web server using Netcat , then send an HTTP request. The response will typically contain information about the service running on the host:

  4. hping - Wikipedia

    en.wikipedia.org/wiki/Hping

    hping is an open-source packet generator and analyzer for the TCP/IP protocol created by Salvatore Sanfilippo (also known as Antirez). It is one of the common tools used for security auditing and testing of firewalls and networks, and was used to exploit the idle scan scanning technique (also invented by the hping author), and now implemented in the Nmap Security Scanner.

  5. Idle scan - Wikipedia

    en.wikipedia.org/wiki/Idle_scan

    Performing a port scan and OS identification (-O option in nmap) on the zombie candidate network rather than just a ping scan helps in selecting a good zombie. As long as verbose mode (-v) is enabled, OS detection will usually determine the IP ID sequence generation method and print a line such as “IP ID Sequence Generation: Incremental”.

  6. Port scanner - Wikipedia

    en.wikipedia.org/wiki/Port_scanner

    Proxy scan - a proxy (SOCKS or HTTP) is used to perform the scan. The target will see the proxy's IP address as the source. This can also be done using some FTP servers. Idle scan - Another method of scanning without revealing one's IP address, taking advantage of the predictable IP ID flaw. CatSCAN - Checks ports for erroneous packets.

  7. Network enumeration - Wikipedia

    en.wikipedia.org/wiki/Network_enumeration

    Network enumeration is a computing activity in which usernames and info on groups, shares, and services of networked computers are retrieved. It should not be confused with network mapping, which only retrieves information about which servers are connected to a specific network and what operating system runs on them.

  8. TCP/IP stack fingerprinting - Wikipedia

    en.wikipedia.org/wiki/TCP/IP_stack_fingerprinting

    Nmap – comprehensive active stack fingerprinting. p0f – comprehensive passive TCP/IP stack fingerprinting. NetSleuth – free passive fingerprinting and analysis tool; PacketFence [9] – open source NAC with passive DHCP fingerprinting. Satori – passive CDP, DHCP, ICMP, HPSP, HTTP, TCP/IP and other stack fingerprinting.

  9. Penetration test - Wikipedia

    en.wikipedia.org/wiki/Penetration_test

    Scanning: Uses technical tools to further the attacker's knowledge of the system. For example, Nmap can be used to scan for open ports. Gaining access: Using the data gathered in the reconnaissance and scanning phases, the attacker can use a payload to exploit the targeted system.