CEH: Gathering Host and Network Information | Scanning - Como Hacks

Como Hacks

Building a comfort for your growth!

CEH: Gathering Host and Network Information | Scanning

Share This

Scanning

It is important that the information-gathering stage be as complete as possible to identify the best location and targets to scan. After the completion of  footprinting and information gathering methodologies, scanning is performed.
During scanning, the hacker has vision to get information about network an hosts which are connected to that network that can help hackers to determine which type of exploit to use in hacking a system precisely. Information such as an IP addresses, operating system, services, and installed applications.

Scanning is the methodology used to detect the system that are alive and respond on the network or not. Ethical hackers use these type of scanning to identify the IP address of target system. Scanning is also used to determine the availability of the system whether it is connected to the network or not.

Types Of Scanning 

Network Scanning Identifies IP addresses on a given network or subnet
Port Scanning Determines open, close, filtered and unfiltered ports and services
Vulnerability Scanner Detect the vulnerability on the target system

Port Scanning ​

Port scanning is the process of identifying open and available TCP/IP ports on a system. Port-scanning tools enable a hacker to learn about the services available on a given system. Each service or application on a machine is associated with a well-known port number. Port Numbers are divided into three ranges:
  • Well-Known Ports: 0-1023
  • Registered Ports: 1024-49151
  • Dynamic Ports: 49152-6553

Network Scanning

Network scanning is performed for the detection of active hosts on a network either you wanna attack them or as a network administrator. Network-scanning tools attempt to identify all the live or responding hosts on the network and their corresponding IP addresses. Hosts are identified by their individual IP addresses.

Vulnerability Scanning

This methodology is used to detect vulnerabilities of computer systems on a network. A vulnerability scanner typically identifies the operating system and version number, including applications that are installed. After that the scanner will try to detect vulnerabilities and weakness in the operating system. During the later attack phase, a hacker can exploit those weaknesses in order to gain access to the system. Moreover, the vulnerability scanner can be detected as well, because the scanner must interact over the network with target machine.

The CEH Scanning Methodology

As a CEH, you should understand the methodology about scanning presented in the figure below. Because this is the actual need of hackers to perform further attacks after the information about network and hosts which are connected to the network. It detects the vulnerabilities in the system bu which hackers can be accessible to that system by exploitation of that vulnerabilities.



15 comments:

  1. kindly provide cehv10 dumps for exam if you have

    ReplyDelete
    Replies
    1. Ceh: Gathering Host And Network Information >>>>> Download Now

      >>>>> Download Full

      Ceh: Gathering Host And Network Information >>>>> Download LINK

      >>>>> Download Now

      Ceh: Gathering Host And Network Information >>>>> Download Full

      >>>>> Download LINK S9

      Delete
  2. Do you need to increase your credit score?
    Do you intend to upgrade your school grade?
    Do you want to hack your cheating spouse Email, whatsapp, Facebook, instagram or any social network?
    Do you need any information concerning any database.
    Do you need to retrieve deleted files?
    Do you need to clear your criminal records or DMV?
    Do you want to remove any site or link from any blog?
    you should contact this hacker, he is reliable and good at the hack jobs..
    contact : cybergoldenhacker at gmail dot com

    ReplyDelete
  3. Do you need to increase your credit score?
    Do you intend to upgrade your school grade?
    Do you want to hack your cheating spouse Email, whatsapp, Facebook, instagram or any social network?
    Do you need any information concerning any database.
    Do you need to retrieve deleted files?
    Do you need to clear your criminal records or DMV?
    Do you want to remove any site or link from any blog?
    you should contact this hacker, he is reliable and good at the hack jobs..
    contact : cybergoldenhacker at gmail dot com

    ReplyDelete
  4. Went through a divorce and found out that my X trashed my credit. In December when I took back my financial life, I was ruined. I discovered my FICO score was at 533, all account was late, over limit, mostly charge offs. Debt was worth $60k. Immediately I put a plan of action on how to fix my credit, because I needed a car for myself. But with my current credit score then I won’t get approved due to the charge offs and debts coupled with low credit score which appeared in my credit report. Thanks to ROOTKITS CREDIT SPECIALIST who was there for me when I needed them the most. After when I spoke with my dad I explained my situation to him, he introduced me to rootkits credit specialist, immediately I contacted them via: rootkitscreditspecialist@gmail.com also texted on +1 760 474 3440. I got replied few minutes and I explained myself and they promised to get job done. Within 5days my credit score changed, charge offs were deleted from my report, all debt cleared and my credit score was raised to 815 across the 3 credit bureaus. My car loan has been approved, I’m super excited to jump into my 2019 Mazda CX-5 car.

    ReplyDelete
  5. Months ago I was scammed by some rip-offs after my father’s death, they promised to fix my credit score. I told them my entire financial situation and they promised to help me ASAP and I trusted them. They asked me to make an upfront payment of $2000 which I did. I had already made the second payment of $2000 before my wonderful cousin sister who has been beside me through all my ordeals convinced me they were scammers, she later introduced me to a credit guru (Metronet Credit Solution) who had helped her acquire loan in the past. They helped me clear every negative item on my report and boosted my score to excellent within 9days interval; they further helped me to recover my $4,000 from those scammers. I’m very grateful for their help. I strongly recommend them to any person in need of credit fix, fund recovery, bitcoin recovery. Are you tired of been scammed Contact them via METRONETCREDITSOLUTION@GMAIL.COM or text 6 2 6 5 1 4 0 6 2 0 for any kind of loan, bitcoin investment and don’t forget to mention me.

    ReplyDelete
  6. Ceh: Gathering Host And Network Information >>>>> Download Now

    >>>>> Download Full

    Ceh: Gathering Host And Network Information >>>>> Download LINK

    >>>>> Download Now

    Ceh: Gathering Host And Network Information >>>>> Download Full

    >>>>> Download LINK Kz

    ReplyDelete