CrazyEngineers
  • Series on Information Security - Weekly -Part 11

    Rahul Jamgade

    Member

    Updated: Oct 26, 2024
    Views: 1.3K
    As a part of reconnaissance , one can use the the methods mentioned below.
    Websites that can be used to collect information is for APNIC , ARIN ,
    <a href="https://www.dnsstuff.com" target="_blank" rel="nofollow noopener noreferrer">Software Reviews, Opinions, and Tips - DNSstuff</a>,
    #-Link-Snipped-#,
    <a href="https://www.lacnic.net" target="_blank" rel="nofollow noopener noreferrer">Registro de Direcciones IP en LAC | LACNIC</a> etc.

    Similarly the few of the tools that can be used for reconnaissance purpose are,
    a) Nmap (#-Link-Snipped-#) : IP and port scanning tool
    b) NSlookup,dig : A tool for discovering IP information on DNS names

    Tools used for scanning

    Angry IP Scanner : A fast and small IP scanner. It pings each IP address to check whether it is alive. Then, optionally, it resolves host names and tries to connect as specified in the Options dialog box TCP port. The advantage of using Angry IP Scanner is the feature that allows to store the results in csv and xml format. The tool is available at #-Link-Snipped-#.

    Here is a sample screen shot for Angry IP scanner.

    upload_2018-3-4_18-50-32

    This is again pre-attack phase. Remember we have already collected some basic information in the reconnaissance attack. This information can be used further for scanning attacks. Here we can collect information like is there any modems available , what are the ports that are available, can we exploit the ports or service, version of application , version of OS , vulnerability associated with particular version of application , service or operating system. At this stage the attack is becoming more of an active attack rather than passive attack. Here the probability of getting detected is more as compared to the previous stage. There are many tools that are available for scanning that includes commercial as well as open source.

    There are numerous Scanning Techniques that can be used for different types of scanning. Here are the scanning techniques under different scenarios.

    i) Port scanning,
    ii) Wardialing,
    iii) wardriving
    iv) vulnerability scanning,
    v) Network mapping

    In the next section we will dive into greater details of the scanning scenarios.
    0
    Replies
Howdy guest!
Dear guest, you must be logged-in to participate on CrazyEngineers. We would love to have you as a member of our community. Consider creating an account or login.
Home Channels Search Login Register